NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. risk identification
  2. waterfall
  3. DMZ
  4. hoaxes
  5. Civil
  1. a The first phase of risk management is _____.
  2. b The _____ is an intermediate area between a trusted network and an untrusted network.
  3. c The _____ model consists of six general phases.
  4. d As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus _____.
  5. e _____ law comprises a wide variety of laws that govern a nation or state.

5 Multiple choice questions

  1. There are individuals who search trash and recycling - a practice known as _____ - to retrieve information that could embarrass a company or compromise information security.
  2. One form of online vandalism is _____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
  3. There are generally two skill levels among hackers: expert and _____.
  4. Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage _____.
  5. An information system is the entire set of _____, people, procedures, and networks that make possible the use of information resources in the organization.

5 True/False questions

  1. MAC_____ addresses are sometimes called electronic serial numbers or hardware addresses.

          

  2. distributed denial-of-serviceIn most common implementation models, the content filter has two components: _____

          

  3. AROA(n) _____ plan deals with the identification, classification, response, and recovery from an incident.

          

  4. Health InsuranceThe _____ Portability and Accountability Act of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.

          

  5. (IP source and destination address; Direction (inbound or outbound); TCP or UDP source and destination port requests)
    ALL OF THE ABOVE
    The restrictions most commonly implemented in packet-filtering firewalls are based on _____.

          

Create Set