NAME

Question Types


Start With


Question Limit

of 100 available terms

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. disadvantage
  2. (IP source and destination address; Direction (inbound or outbound); TCP or UDP source and destination port requests)
    ALL OF THE ABOVE
  3. accept control
  4. risk identification
  5. domains
  1. a The _____ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
  2. b The concept of competitive _____ refers to falling behind the competition.
  3. c The restrictions most commonly implemented in packet-filtering firewalls are based on _____.
  4. d The first phase of risk management is _____.
  5. e Security _____are the areas of trust within which users can freely communicate.

5 Multiple Choice Questions

  1. In most common implementation models, the content filter has two components: _____
  2. Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage _____.
  3. According to Mark Pollitt, _____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.
  4. Management of classified data includes its storage and _____.
  5. The _____ security policy is an executive-level document that outlines the organization's approach and attitude towards information security and relates the strategic value of information security within the organization.

5 True/False Questions

  1. Financial Services Modernization Act_____ defines stiffer penalties for prosecution of terrorists crimes.

          

  2. social engineeringIn most common implementation models, the content filter has two components: _____

          

  3. MAC layerA _____ site provides only rudimentary services and facilities.

          

  4. assessmentIncident damage _____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.

          

  5. FCOA(n) _____ is an authorization issued by an organization for the repair, modification, or update of a piece of equipment.

          

Create Set