NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. appetite
  2. transport
  3. Stateful
  4. to harass
  5. CBA
  1. a _____ inspection firewalls keep track of each network connection between internal and external systems.
  2. b The formal decision making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) _____.
  3. c According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except _____.
  4. d Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
  5. e In _____ mode, the data within an IP packet is encrypted, but the header information is not.

5 Multiple choice questions

  1. Incident damage _____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.
  2. A(n) _____ plan deals with the identification, classification, response, and recovery from an incident.
  3. The _____ Portability and Accountability Act of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
  4. Standards may be published, scrutinized, and ratified by a group, as in formal or _____ standards.
  5. The _____ strategy attempts to prevent the exploitation of the vulnerability.

5 True/False questions

  1. maintenance and changeIn the well-known _____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the networks.

          

  2. ISO/IEC 27002There are generally two skill levels among hackers: expert and _____.

          

  3. (distribution, portability, destruction)
    ALL OF THE ABOVE
    Effective management includes planning and _____.

          

  4. domainsSecurity _____are the areas of trust within which users can freely communicate.

          

  5. NSTISSI No. 4011_____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.