NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. VPN
  2. assessment
  3. TCP
  4. standard of due care
  5. vision
  1. a Incident damage _____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.
  2. b The _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
  3. c When organizations adopt levels of security for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as a(n) _____.
  4. d A(n) _____ is "a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures."
  5. e Strategic planning is the process of moving the organization towards its _____.

5 Multiple choice questions

  1. The Council of Europe adopted the Convention of Cybercrime in _____.
  2. Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
  3. _____ is the predecessor to the Internet.
  4. Firewalls fall into _____ major processing-mode categories.
  5. According to Mark Pollitt, _____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.

5 True/False questions

  1. accept controlThe _____ security policy is an executive-level document that outlines the organization's approach and attitude towards information security and relates the strategic value of information security within the organization.

          

  2. OperationalSecurity _____are the areas of trust within which users can freely communicate.

          

  3. hacktivist_____ law comprises a wide variety of laws that govern a nation or state.

          

  4. rosterKerberos _____ provides tickets to clients who request services.

          

  5. 7ICMP uses port _____ to request a response to a query and can be the first indicator of a malicious attack.

          

Create Set