Computer Science > TEST BANK > [Test Bank] Principles of Computer Security: CompTIA Security+ and Beyond, 5th Edition by Conklin, W (All)
Chapter 02 General Security Concepts Multiple Choice Questions 1. (p. 21) ___________ places the focus on the security processes and the actual data. A. Computer security B. Network ... security C. Information assurance D. Communications security Difficulty: Easy 2. (p. 21) The term which refers to the attempt to gain unauthorized access to systems and computers used by a telephone company to operate its telephone network is a _______. A. phone hacker B. hacktivist C. commh@ck3r D. phreaker Difficulty: Easy 3. (p. 22) Jane is in the finance department. Although she should not be able to open files or folders from the marketing department, she can and does. This a problem of ___________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 4. (p. 22) Jane is in the finance department. Although she should not be able to modify files or folders from the marketing department, she can, and does. This a problem of ___________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 5. (p. 22) Bob inadvertently disconnects the cable from the company file server. This creates a problem of ________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 6. (p. 22) Joe sends a scathing e-mail to his boss regarding increased work hours. Joe tries to deny sending the e-mail, but is unable to due to the use of digital signatures. This is an example of ________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 7. (p. 22) Ensuring that and individual is who they claim to be is the function of _________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 8. (p. 22-23) The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured firewall. This is a failure of which element of the operational model of computer security? A. Protection B. Prevention C. Detection D. Response Difficulty: Medium 9. (p. 22) The operational model of security is _____________. A. Prevention = Protection + (Detection + Response) B. Prevention = Protection + (Detection x Response) C. Protection = Prevention + (Detection + Response) D. Protection = Prevention + (Detection x Response) Difficulty: Easy 10. (p. 22-23) A newly purchased server with a defect catches fire and all data on the device is lost. A backup was never performed. This is a failure of which element of the operational model of computer security? A. Protection B. Prevention C. Detection D. Response Difficulty: Medium [Show More]
Last updated: 1 year ago
Preview 1 out of pages
Connected school, study & course
About the document
Uploaded On
Mar 11, 2021
Number of pages
Written in
This document has been written for:
Uploaded
Mar 11, 2021
Downloads
0
Views
4
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·