MIS 200 Module 4 – 6 Test with All Questions
100% Solved with Verified Answers
A distributed denial-of-service (DDoS) attack involves hundreds of computers working
together to bombard a Web site with thousands of requests for information in a short
period. - Answer true
____ is a commonly used encryption protocol that manages transmission security on the
Internet. - Answer secure sockets layer
Which of the following is a physical security measure? - Answer electronic trackers
Part of ensuring integrity is identifying authorized users and granting them access
privileges. - Answer true
Data encryption transforms data into a scrambled form called ciphertext. - Answer true
___ are usually placed in front of a firewall and can identify attack signatures and trace
patterns. - Answer Intrusion detection systems
In ____ encryption, the same key is used to encrypt and decrypt the message. - Answer
symmetric
____ security measures use a physiological element to enhance security measures. -
Answer biometric
Corner bolts are secured to a computer at the power outlet. - Answer false
, Which of the following is a nonbiometric security measure? - Answer firewalls
____ ensures data security and integrity over public networks, such as the Internet. -
Answer transport layer security
____ encryption uses a public key known to everyone and a private key known only to
the recipient. - Answer asymmetric
The main advantage of asymmetric encryption is that it is faster and requires only a
small amount of processing power. - Answer false
Which of the following is a biometric security measure? - Answer signature analysis
A ____ attack floods a network or server with service requests to prevent legitimate
users' access to the system - Answer denial of service
Which of the following is considered an intentional threat? - Answer social engineering
The main function of the ____ model is to provide information on security incidents,
including information systems' vulnerabilities, viruses, and malicious programs - Answer
CIRC
Level 1 security involves ____. - Answer front-end servers
____ means that computers and networks are operating and authorized users can
access the information they need - Answer availability
100% Solved with Verified Answers
A distributed denial-of-service (DDoS) attack involves hundreds of computers working
together to bombard a Web site with thousands of requests for information in a short
period. - Answer true
____ is a commonly used encryption protocol that manages transmission security on the
Internet. - Answer secure sockets layer
Which of the following is a physical security measure? - Answer electronic trackers
Part of ensuring integrity is identifying authorized users and granting them access
privileges. - Answer true
Data encryption transforms data into a scrambled form called ciphertext. - Answer true
___ are usually placed in front of a firewall and can identify attack signatures and trace
patterns. - Answer Intrusion detection systems
In ____ encryption, the same key is used to encrypt and decrypt the message. - Answer
symmetric
____ security measures use a physiological element to enhance security measures. -
Answer biometric
Corner bolts are secured to a computer at the power outlet. - Answer false
, Which of the following is a nonbiometric security measure? - Answer firewalls
____ ensures data security and integrity over public networks, such as the Internet. -
Answer transport layer security
____ encryption uses a public key known to everyone and a private key known only to
the recipient. - Answer asymmetric
The main advantage of asymmetric encryption is that it is faster and requires only a
small amount of processing power. - Answer false
Which of the following is a biometric security measure? - Answer signature analysis
A ____ attack floods a network or server with service requests to prevent legitimate
users' access to the system - Answer denial of service
Which of the following is considered an intentional threat? - Answer social engineering
The main function of the ____ model is to provide information on security incidents,
including information systems' vulnerabilities, viruses, and malicious programs - Answer
CIRC
Level 1 security involves ____. - Answer front-end servers
____ means that computers and networks are operating and authorized users can
access the information they need - Answer availability