Computer Science > TEST BANK > [Test Bank] Principles of Computer Security: CompTIA Security+ and Beyond, 5th Edition by Conklin, W (All)

[Test Bank] Principles of Computer Security: CompTIA Security+ and Beyond, 5th Edition by Conklin, White, Cothren, Davis, Williams

Document Content and Description Below

Chapter 02 General Security Concepts Multiple Choice Questions 1. (p. 21) ___________ places the focus on the security processes and the actual data. A. Computer security B. Network ... security C. Information assurance D. Communications security Difficulty: Easy 2. (p. 21) The term which refers to the attempt to gain unauthorized access to systems and computers used by a telephone company to operate its telephone network is a _______. A. phone hacker B. hacktivist C. commh@ck3r D. phreaker Difficulty: Easy 3. (p. 22) Jane is in the finance department. Although she should not be able to open files or folders from the marketing department, she can and does. This a problem of ___________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 4. (p. 22) Jane is in the finance department. Although she should not be able to modify files or folders from the marketing department, she can, and does. This a problem of ___________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 5. (p. 22) Bob inadvertently disconnects the cable from the company file server. This creates a problem of ________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 6. (p. 22) Joe sends a scathing e-mail to his boss regarding increased work hours. Joe tries to deny sending the e-mail, but is unable to due to the use of digital signatures. This is an example of ________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 7. (p. 22) Ensuring that and individual is who they claim to be is the function of _________. A. confidentiality B. integrity C. availability D. authentication E. nonrepudiation Difficulty: Easy 8. (p. 22-23) The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured firewall. This is a failure of which element of the operational model of computer security? A. Protection B. Prevention C. Detection D. Response Difficulty: Medium 9. (p. 22) The operational model of security is _____________. A. Prevention = Protection + (Detection + Response) B. Prevention = Protection + (Detection x Response) C. Protection = Prevention + (Detection + Response) D. Protection = Prevention + (Detection x Response) Difficulty: Easy 10. (p. 22-23) A newly purchased server with a defect catches fire and all data on the device is lost. A backup was never performed. This is a failure of which element of the operational model of computer security? A. Protection B. Prevention C. Detection D. Response Difficulty: Medium [Show More]

Last updated: 1 year ago

Preview 1 out of  pages

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
4
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 11, 2021

Number of pages

Written in

Seller


seller-icon
Clinton

Member since 3 years

67 Documents Sold


Additional information

This document has been written for:

Uploaded

Mar 11, 2021

Downloads

 0

Views

 4

Document Keyword Tags

Recommended For You


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·