NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. social engineering
  2. rating and filtering
  3. accept control
  4. SysSPs
  5. Risk
  1. a In most common implementation models, the content filter has two components: _____
  2. b "4-1-9" fraud is an example of a _____ attack.
  3. c The _____ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
  4. d _____ equals likelihood of vulnerability occurrence times value (or impact) minus percentage risk already controlled plus an element of uncertainty.
  5. e _____ often function as standards or procedures to be used when configuring or maintaining systems.

5 Multiple choice questions

  1. Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?
  2. Microsoft acknowledged that if you type a res://URL (a Microsoft-devised type of URL) which is longer than _____ characters in Internet Explorer 4.0, the browser will crash.
  3. Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
  4. The _____ is a methodology for the design and implementation of an information system in an organization.
  5. The National Information Infrastructure Protection Act of 1996 modified which Act?

5 True/False questions

  1. TCPThe _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

          

  2. standard of due careWhich of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

          

  3. (software, hardware, data)
    D. ALL OF THE ABOVE
    Which of the following is a valid type of data ownership?

          

  4. SingaporeWhich of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

          

  5. electronic vaulting_____ controls address personnel security, physical security, and the protection of production inputs and outputs.

          

Create Set