ISM Cengage Quizzes – Questions & Accurate Solutions
____ is a method of access control that prevents unauthorized users from using
an unattended computer to access the network and data. Right Ans -
Terminal resource security
Which statement is true of application-filtering firewalls? Right Ans - They
are more expensive than packet-filtering firewalls.
The three important aspects of computer and network security,
confidentiality, integrity, and availability, are collectively referred to as the
CIA triangle. Right Ans - True
In the context of computer and network security, _____ means that a system
must not allow the disclosing of information by anyone who is not authorized
to access it. Right Ans - confidentiality
A _____ is a security threat that may launch a worm through a Trojan horse or
launch a denial-of-service attack at a targeted IP address. Right Ans -
Blended threat
An intrusion detection system (IDS) can protect networks against both
external and internal access. Right Ans - True
When an organization develops a comprehensive security plan, it should set
up a security committee with representatives from all departments as well as
upper management. Right Ans - True
In contrast to pharming, phishing involves hijacking an official Web site
address by hacking a Domain Name System server. Right Ans - False
The Committee on National Security Systems (CNSS) proposed a model
known as the _____ for evaluating information security. Right Ans -
McCumber cube
Which is a nonbiometric security measure? Right Ans - Callback modems
A _____ consists of self-propagating program code that is triggered by a
specified time or event. Right Ans - Virus
,In the context of computer and network security, _____ refers to the accuracy of
information resources within an organization. Right Ans - Integrity
A(n) _____ is a combination of hardware and software that acts as a filter or
barrier between a private network and external computers or networks.
Right Ans - firewall
_____, a recent cryptographic protocol, ensures data security and integrity over
public networks, such as the Internet. Right Ans - Transport Layer Security
In the context of firewall as a nonbiometric security measure, a _____ is
software that acts as an intermediary between two systems. Right Ans -
proxy server
A(n) _____contains code intended to disrupt a computer, network, or Web site
and is usually hidden inside a popular program. Right Ans - Trojan
program
_____ is an attempt to gain access to a network by posing as an authorized user
in order to find sensitive information, such as passwords and credit card
information. Right Ans - Spoofing
Which statement is true of asymmetric encryption? Right Ans - It requires
a large amount of processing power.
_____ is the unauthorized use of system data for personal gain, such as
transferring money from another's account or charging purchases to someone
else's account. Right Ans - Computer fraud
As a physical security measure, _____. Right Ans - electronic trackers are
attached to a computer at the power outlet
In a level 2 security system, _____ must be protected to ensure confidentiality,
accuracy, and integrity of data. Right Ans - back-end systems
_____ are an inexpensive way to secure a computer to a desktop or counter and
often have locks as an additional protection against theft. Right Ans -
Corner bolts
, In the event of a network attack or intrusion, a _____ lists the tasks that must be
performed by the organization to restore damaged data and equipment.
Right Ans - disaster recovery plan
_____ are usually placed in front of a firewall and can identify attack signatures,
trace patterns, generate alarms for a network administrator, and cause
routers to terminate connections with suspicious sources. Right Ans -
Intrusion detection systems
Application-filtering firewalls are less expensive than packet-filtering
firewalls. Right Ans - False
When a computer is infected by a virus, _____. Right Ans - some programs
suddenly increase in size
In the context of e-commerce transaction security measures, authentication is
a critical factor because it ensures that: Right Ans - the person using a
credit card number is the card's legitimate owner.
In the context of intentional computer and network threats, a _____ combines
the characteristics of computer viruses, worms, and other malicious codes
with vulnerabilities found on public and private networks. Right Ans -
blended threat
_____ is an example of antispyware software. Right Ans - STOPzilla
Which of the following is a biometric security measure? Right Ans -
Signature analysis
Data sent through a virtual private network (VPN) can be encrypted using the
_____. Right Ans - Layer Two Tunneling Protocol
When using mirror disks, if one of the two disks containing the same data fails,
the other disk also fails. Right Ans - False
Auction fraud is sending fraudulent e-mails that seem to come from legitimate
sources, such as a bank or university. Right Ans - False
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Zendaya. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $19.99. You're not tied to anything after your purchase.