Filters
Question type

Study Flashcards

Develop the information security policies is the ________________ step for creating an information security plan.

Correct Answer

verifed

verified

A(n)information security ____________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.

Correct Answer

verifed

verified

_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

What includes a variety of threats such as viruses,worms,and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords __________.

Correct Answer

verifed

verified

automatically

What is a method for confirming users' identities?


A) Authentication
B) Prevention
C) Detection
D) Response

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the most costly and intrusive form of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of these

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

C

A(n)_______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

sniffer

A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.

Correct Answer

verifed

verified

What is encryption?


A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.

Correct Answer

verifed

verified

_________ programs are viruses that open a way into the network for future attacks.

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 76

Related Exams

Show Answer