NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. risk identification
  2. SOCKS
  3. Incident response
  4. dynamic
  5. USA Patriot Act
  1. a _____ defines stiffer penalties for prosecution of terrorists crimes.
  2. b _____ is the protocol for handling TCP traffic through a proxy server.
  3. c A _____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
  4. d Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. _____ dictates what steps are taken when an attack occurs.
  5. e The first phase of risk management is _____.

5 Multiple choice questions

  1. _____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.
  2. The National Information Infrastructure Protection Act of 1996 modified which Act?
  3. According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except _____.
  4. The _____ strategy attempts to shift risk to other assets, other processes, or other organizations.
  5. Incident damage _____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.

5 True/False questions

  1. MAC_____ generates and issues session keys in Kerberos.

          

  2. data classification schemeThe first phase of risk management is _____.

          

  3. KDC_____ generates and issues session keys in Kerberos.

          

  4. Physical_____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

          

  5. dumpster diving_____ controls address personnel security, physical security, and the protection of production inputs and outputs.

          

Create Set