Appendix: Information Security

This question bank verified by Studydeets
All Questions
Filter by:
Question 1
Free
Multiple Choice

What is the recommended way to implement information security lines of defense?

Choose correct answer/s
A

People first, technology second

B

Technology first, people second

C

None of these

D

All of these

Check answer
Question 2
Free
Multiple Choice

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

Choose correct answer/s
A

Hactivist

B

Social engineering

C

Insiders

D

Virus

Check answer
Question 3
Free
Multiple Choice

What identifies the rules required to maintain information security?

Choose correct answer/s
A

Information security plan

B

Information security policies

C

Authentication

D

Biometrics

Check answer
Question 4
Free
Multiple Choice

Which of the following is not one of the five steps for creating an information security plan?

Choose correct answer/s
A

Develop the information security policies

B

Communicate the information security policies

C

Revise and test the information security policies

D

None of these

Check answer
Question 5
Free
Multiple Choice

What is social engineering?

Choose correct answer/s
A

Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker

B

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

C

Small electronic devices that change user passwords automatically

D

A method for confirming user's identities

Check answer
Question 6
Multiple Choice

Which of the following is not one of the three primary information security areas?

Choose correct answer/s
A
Authentication and authorization
B
Prevention and resistance
C
Detection and resistance
D
None of these
To unlock the question
Question 7
Multiple Choice

What is a method for confirming users' identities?

Choose correct answer/s
A
Authentication
B
Prevention
C
Detection
D
Response
To unlock the question
Question 8
Multiple Choice

What is the most secure type of authentication?

Choose correct answer/s
A
Something the user knows such as a user ID and password
B
Something the user has such as a smart card or token
C
Something that is part of the user such as a fingerprint or voice signature
D
All of these
To unlock the question
Question 9
Multiple Choice

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

Choose correct answer/s
A
Token
B
Password
C
Smart card
D
Biometrics
To unlock the question
Question 10
Multiple Choice

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

Choose correct answer/s
A
Smart card
B
Token
C
Biometrics
D
Content filtering
To unlock the question
Question 11
Multiple Choice

Which of the following is not considered a type of biometrics?

Choose correct answer/s
A
Voice
B
Face
C
Iris
D
None of these
To unlock the question
Question 12
Multiple Choice

What is the most costly and intrusive form of authentication?

Choose correct answer/s
A
Something the user knows such as a user ID and password
B
Something the user has such as a smart card or token
C
Something that is part of the user such as a fingerprint or voice signature
D
None of these
To unlock the question
Question 13
Multiple Choice

Which of the following authentication methods is 100 percent accurate?

Choose correct answer/s
A
Smart card
B
Fingerprint authentication
C
User ID
D
None of these
To unlock the question
Question 14
Multiple Choice

What are the technologies available to help prevent and build resistance to attacks?

Choose correct answer/s
A
Content filtering, encryption, firewalls
B
Content filtering, encryption, insiders
C
Encryption, firewalls, insiders
D
Firewalls, social engineering, encryption
To unlock the question
Question 15
Multiple Choice

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

Choose correct answer/s
A
Biometrics
B
Encryption
C
Firewalls
D
None of these
To unlock the question
Question 16
Multiple Choice

What is spam?

Choose correct answer/s
A
A type of encryption
B
A type of content filtering
C
A form of unsolicited email
D
None of these
To unlock the question
Question 17
Multiple Choice

What is encryption?

Choose correct answer/s
A
Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B
Scrambles information into an alternative form that requires a key or password to decrypt the information
C
Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D
A form of unsolicited email
To unlock the question
Question 18
Multiple Choice

Which of the following can be completed by encryption?

Choose correct answer/s
A
Switch the order of characters
B
Replace characters with other characters
C
Use a mathematical formula to convert the information into some sort of code
D
All of these
To unlock the question
Question 19
Multiple Choice

Where do organizations typically place firewalls?

Choose correct answer/s
A
Between a personal computer and the server
B
Between a personal computer and a printer
C
Between the server and the content filtering software
D
Between the server and the Internet
To unlock the question
Question 20
Multiple Choice

Which of the following does a firewall perform?

Choose correct answer/s
A
Examines each message that wants entrance to the network
B
Blocks messages without the correct markings from entering the network
C
Detects computers communicating with the Internet without approval
D
All of these
To unlock the question