Cybersecurity
Sign in to Google to save your progress. Learn more
Which one of the following exposures associated with the spooling of sensitive reports for offline printing could be considered the most serious?Untitled Question
1 point
Clear selection
Which one of the following is not a common integrity goal?
1 point
Clear selection
What is the Biba security model concerned with?
1 point
Clear selection
Attributable data should be
1 point
Clear selection
Which one of the following is not a method to protect objects and the data within the objects?
1 point
Clear selection
What does it mean if a system uses "Trusted Recovery"?
1 point
Clear selection
Which one of the following questions is less likely to help in assessing controls covering audit trails?
1 point
Clear selection
What is a locking device that prevents unauthorized unplugging of cables from computer devices called?
1 point
Clear selection
When it comes to magnetic media sanitization, what difference can be made between clearing and purging information?
1 point
Clear selection
The Information Technology Security Evaluation Criteria (ITSEC) was written to address which one of the following that the Orange Book did not address
1 point
Clear selection
____________ encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that are designed to harm the performance of computers on your network.
1 point
Clear selection
When the sender and the recipient can transmit data to each other over an unsecured or monitored link by encrypting messages without worrying that their communications are being monitored, it is called:
1 point
Clear selection
Which one of the following is a primary mechanism for a malicious code to enter a desktop?
1 point
Clear selection
Networks that allow access to some database materials and e-mail are called:
1 point
Clear selection
Which one of the following is a message signed with a sender's private key that can be verified by anyone who has access to the sender's public key,thereby proving that the sender had access to the private key (and therefore is likely to be the person associated with the public key used),and the part of the message that has not been tampered with.
1 point
Clear selection
An individual's ______________ is unique
1 point
Clear selection
A ____________________ is a duplicate of some or all of a main database's data stored on a separate computer from the main database
1 point
Clear selection
A prolonged increase in the voltage level is called a:
1 point
Clear selection
What is the default cipher for the IPSec?
1 point
Clear selection
When it comes to magnetic media sanitization,what difference can be made between clearing and purging information?
1 point
Clear selection
Submit
Clear form
This form was created inside of Maryland FBLA. Report Abuse