Question types

Start with

Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. denial-of-service
  3. transfer control
  4. Stateful
  5. hacktivist
  1. a _____ was the first operating system to integrate security as its core functions.
  2. b In a _____ attack, the attacker sends a large number of connection or information requests to a target.
  3. c The _____ strategy attempts to shift risk to other assets, other processes, or other organizations.
  4. d One form of online vandalism is _____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
  5. e _____ inspection firewalls keep track of each network connection between internal and external systems.

5 Multiple choice questions

  1. The stated purpose of _____ is to "give recommendations for information security management for use by those who are responsible for initiating, implementing, or maintaining security in their organization."
  2. The _____ is a methodology for the design and implementation of an information system in an organization.
  3. A buffer against outside attacks is frequently referred to as a(n) _____.
  4. The _____ security policy is a planning document that outlines the process of implementing security in the organization.
  5. In the well-known _____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the networks.

5 True/False questions

  1. NSTISSI No. 4011Strategic planning is the process of moving the organization towards its _____.


  2. standard of due careWhich of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?


  3. rating and filteringIn most common implementation models, the content filter has two components: _____


  4. USA Patriot ActRisk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.


  5. Operational_____ controls address personnel security, physical security, and the protection of production inputs and outputs.