Monday, March 4, 2019
Info Systems
Part I True/ monstrous evaluation and Multiple-choice questions (0. 5 points/each question) 1. The overarching goal of information security department is to ensure data integrity, availability, and confidentiality. 2. Managing security refers to a comprehensive set of activities that develop, implement, direct, and monitor the physical compositions security strategy and activities. 3. The most expensive cybercrime are computer viruses. 4. Authentication is a means of providing proof of data transmitting or receipt so that the occurrence of a transaction cannot later(prenominal) be refused. . The trend in computer security is toward policy-based solicitude. 6. The core altercate of security management is ___________. a)Finding the right balance between shielding the organizations main assets from potential harm b)Enabling staff to do their jobs c)Both a) and b) 7. Which of the undermentioned hacker tricks involves launching software that monitors all traffic looking for passw ords or other valuable information? a)Main-in-the middle b)Denial of service c)Trojan horse d)Network sniffing 8.Defining security policies and then managing and enforcing those policies via security management products and services is known as _______. a)Intrusion-based management b)Policy-based management c)Incident-based management 9. To protect against spoofing, firms need a way to ____________. a)Authenticate the individuation of an individual b)Repudiate the identify of an individual c)Dispute the identity of an individual 10. To protect against hacking, companies inject ___________ which controls access between networks. a)Virtual private systems b)Encryption c)Firewalls
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment