CH7 - Question 1 Selected Answer: True Correct Answer:...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 0 out of 1 points The WEP specification calls for users to create unique 40-bit encrypted passwords. Selected Answer: True Correct Answer: False Question 2 1 out of 1 points Fault-tolerant computers contain redundant hardware, software, and power supply components. Selected Answer: True Correct Answer: True Question 3 1 out of 1 points The Department of Homeland Security has an Information Analysis and Infrastructure Protection Directorate responsible for coordinating cybersecurity.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Selected Answer: True Correct Answer: True Question 4 1 out of 1 points A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic. Selected Answer: True Correct Answer: True Question 5 1 out of 1 points Packet filtering catches most types of network attacks. Selected Answer: False Correct Answer: False Question 6 1 out of 1 points
Background image of page 2
DoS attacks are used to destroy information and access restricted areas of a company's information system. Selected Answer: False Correct Answer: False Question 7 1 out of 1 points Antivirus software detects and eliminates viruses that are trying to enter your system. Selected Answer: True Correct Answer: True Question 8 1 out of 1 points SSL is a protocol used to secure information transfer over the Internet. Selected Answer: True Correct Answer: True
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Question 9 1 out of 1 points A worm is an application program used to drill down into databases. Selected Answer: False Correct Answer: False Question 10 1 out of 1 points People who break into computer systems are called spammers. Selected Answer: False Correct Answer: False Question 11 1 out of 1 points A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system.
Background image of page 4
Selected Answer: True Correct Answer: True Question 12 1 out of 1 points Redirecting a Web link to a different address is a form of: Selected Answer: spoofing. Correct Answer: spoofing. Question 13 1 out of 1 points An independent computer program that copies itself from one computer to another over a network is called a: Selected Answer: worm. Correct Answer: worm. Question 0 out of 1 points
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n): Selected Answer: security policy. Correct Answer: business impact analysis. Question 15 0 out of 1 points In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? Selected Answer:
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 86

CH7 - Question 1 Selected Answer: True Correct Answer:...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online