NAME

Question types


Start with


Question limit

of 100 available terms

Print test

5 Written questions

5 Matching questions

  1. Network
  2. VPN
  3. cyberterrorism
  4. SAM
  5. 7
  1. a ICMP uses port _____ to request a response to a query and can be the first indicator of a malicious attack.
  2. b A(n) _____ is "a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures."
  3. c The _____ data file contains the hashed representation of the user's password.
  4. d According to Mark Pollitt, _____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.
  5. e _____-based IDPSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.

5 Multiple choice questions

  1. _____ controls address personnel security, physical security, and the protection of production inputs and outputs.
  2. A buffer against outside attacks is frequently referred to as a(n) _____.
  3. The concept of competitive _____ refers to falling behind the competition.
  4. The Computer _____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.
  5. The _____ security policy is an executive-level document that outlines the organization's approach and attitude towards information security and relates the strategic value of information security within the organization.

5 True/False questions

  1. dynamicA buffer against outside attacks is frequently referred to as a(n) _____.

          

  2. PKI_____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.

          

  3. programThe _____ security policy is a planning document that outlines the process of implementing security in the organization.

          

  4. TCPThe _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

          

  5. ARPANET_____ is the predecessor to the Internet.