Question types

Start with

Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  2. to harass
  3. roster
  4. SysSPs
  5. Public
  1. a _____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.
  2. b _____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.
  3. c According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except _____.
  4. d _____ often function as standards or procedures to be used when configuring or maintaining systems.
  5. e An alert _____ is a document containing contact information for the people to be notified in the event of an incident.

5 Multiple choice questions

  1. Standards may be published, scrutinized, and ratified by a group, as in formal or _____ standards.
  2. Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
  3. _____ defines stiffer penalties for prosecution of terrorists crimes.
  4. One form of online vandalism is _____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
  5. The _____ is a methodology for the design and implementation of an information system in an organization.

5 True/False questions

  1. FCOA(n) _____ is an authorization issued by an organization for the repair, modification, or update of a piece of equipment.


  2. (distribution, portability, destruction)
    Effective management includes planning and _____.


  3. Economic Espionage Act_____ attempts to prevent trade secrets from being illegally shared.


  4. dumpster divingThere are individuals who search trash and recycling - a practice known as _____ - to retrieve information that could embarrass a company or compromise information security.


  5. standard of due careIn a _____ attack, the attacker sends a large number of connection or information requests to a target.