Wednesday, July 17, 2019
Info Systems
vary I True/False rating and Multiple-choice questions (0. 5 points/each question) 1. The overarching coating of information security measure is to ensure information integrity, availability, and confidentiality. 2. Managing security refers to a comprehensive flummox of activities that develop, implement, direct, and monitor the arrangings security strategy and activities. 3. The most expensive cybercrime are computer viruses. 4. Authentication is a actor of providing proof of data transmission or receipt so that the occurrence of a transaction cannot later be refused. . The curl in computer security is toward policy-based wariness. 6. The kernel challenge of security anxiety is ___________. a)Finding the compensate balance among shielding the organizations main assets from potential disability b)Enabling staff to do their jobs c)Both a) and b) 7. Which of the following political hack tricks involves launching software that monitors all relations looking for passwor ds or other precious information? a)Main-in-the middle b)Denial of service c)Trojan one dollar bill d)Network sniffing 8.Defining security policies and then managing and enforcing those policies via security management products and services is known as _______. a)Intrusion-based management b)Policy-based management c)Incident-based management 9. To protect against spoofing, firms withdraw a way to ____________. a)Authenticate the identity of an single b)Repudiate the identify of an psyche c)Dispute the identity of an individual 10. To protect against hacking, companies install ___________ which controls access between networks. a)Virtual private systems b)Encryption c)Firewalls
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.