Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Security
Quiz 1: Cybersecurity and Technology
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
This technology is used to measure and analyze human body characteristics for authentication purposes.
Question 2
Multiple Choice
__________ is an electronic or paper log used to track computer activity.
Question 3
Multiple Choice
This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.
Question 4
Multiple Choice
This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
Question 5
Multiple Choice
This is a mechanism for ensuring that only authorized users can copy or use specific software applications.
Question 6
Multiple Choice
At which two traffic layers do most commercial IDSes generate signatures?
Question 7
Multiple Choice
This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites.
Question 8
Multiple Choice
___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals.
Question 9
Multiple Choice
This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
Question 10
Multiple Choice
This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.