NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Operational
  2. SAM
  3. appetite
  4. Electronic Communications Privacy Act
  5. SOCKS
  1. a Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
  2. b _____ controls address personnel security, physical security, and the protection of production inputs and outputs.
  3. c The _____ data file contains the hashed representation of the user's password.
  4. d _____ is the protocol for handling TCP traffic through a proxy server.
  5. e Which of the following acts is a collection of statues that regulate the interception of wire, electronic, and oral communications?

5 Multiple choice questions

  1. _____ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model.
  2. The _____ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
  3. What is the subject of the Computer Security Act?
  4. Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. _____ dictates what steps are taken when an attack occurs.
  5. _____ plans usually include all preparations fro the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the floodwaters recede.

5 True/False questions

  1. PKI_____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.

          

  2. hacktivistOne form of online vandalism is _____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

          

  3. RiskThe SETA program is the responsibility of the _____ and is a control measure designed to reduce the incidences of accidental security breaches by employees.

          

  4. rating and filteringIn most common implementation models, the content filter has two components: _____

          

  5. transportIn _____ mode, the data within an IP packet is encrypted, but the header information is not.

          

Create Set