• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

ISM 4220 Exam 3

Study Material Feb 13, 2025
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

ISM 4220 Exam 3
Which of the following is not one of the major categories (or sub-categories) into which
network security threats can be placed?
controlled chaos
An example of _____ of data would be if a computer virus eliminated files on that
computer.
Destruction
Often, incidents of unauthorized access known as ___________, involve employees of
the organization, surprisingly enough.
Intrusion
A hacker gaining access to organizational data files and resources is an example of a(n)
____________ threat.
Intrusion
________ controls discover unwanted events.
Detective
A ___________ assigns levels of risk to various threats to network security by
comparing the nature of the threats to the controls designed to reduce them.
risk assessment
A(n) ____________, is an information system that is critical to the survival of an
organization.
mission critical application
The key principle in preventing disruption, destruction and disaster is ___________.
Redundancy
A (n) ______ is a special type of virus that spreads itself without human intervention.
Worm
Which of the following is not a type of intruder who attempts to gain intrusion to
computer networks?
Delphi team member
The three basic network access points into most organizational networks are from the
Internet, from LANs inside of the organization and ________________.
WLANs
Which of the following are usually the first choice for eavesdropping?
wireless LANs
Which of the following is not a method for deterring outside intruders from gaining
access to the organization's office or network equipment facilities?
unlocked wiring closet for network devices
_______________ is an encryption standard that uses a total of 168 bits as the key.
triple DES
A __________ is a router or special purpose computer that examines packets flowing
into and out of a network and restricts access to the organization's network.
Firewall
IP spoofing means to:
fool the target computer and any intervening firewall into believing that messages from
the intruder's computer are actually coming from an authorized user inside the
organization's network
A(n) _______ is a screened subnet devoted solely to public access servers such as
Web servers and public DNS servers.
DMZ
Spyware, adware and DDOS agents are three types of:
Trojans
Encryption is the process of:
disguising information by the use of mathematical rules, known as algorithms
A brute force attack against an encryption system:
tries to gain access by trying every possible key
__________ provide authentication which can legally prove who sent a message over a
network.
digital signatures
IP Security Protocol:
sits between IP at the network layer and TCP/UDP at the transport layer
Which of the following is not true about one-time passwords?
They create a packet level firewall on the system.
A fundamental technique to determine if an intrusion is in progress in a stable network
is:
anomaly detection
The use of computer analysis techniques to gather evidence for criminal and/or civil
trials is known as:
computer forensics
The use of hacking techniques to bring attention to a larger political or social goal is
referred to as
Hacktivism
_______________ describes how an asset can be compromised by one specific threat.
threat scenarios
Which of the following is a type of intrusion prevention system?
host-based
We can calculate the relative ___________, by multiplying the impact score by the
likelihood.
risk score
The traditional network design approach does not work well for _________ networks.
rapidly growing
The building block design approach is sometimes called:
narrow and deep
Which of the following is not one of the three major steps used in of the building-block
process to network design?
implementation and maintenance
In the __________ step of the building-block process to network design, the network
designer examines the available technologies and assesses which options will meet the
users' needs.
technology design
Which of the following is not true about network design?
In designing LAN networks, network designers tend to err on the side of providing for
less capacity than what is currently necessary
Gaining an understanding of the current application system and messages provides a
_________ against which future design requirements can be gauged.
Baseline
__________ is not an important consideration when network designers review old and
new applications.
Reviewing the NFL scores

ISM 4220 Exam,ISM 4220 Test,ISM 4220 Flashcard,ISM 4220 quiz,ISM 4220 Practice,ISM 4220 Practice test,ISM 4220 Practice flashcard,ISM 4220 Practice exam,ISM 4220 Study guide,ISM 4220 Practice questions,ISM 4220 Questions,ISM 4220 Practice questions and answers,ISM 4220 Questions and answers,ISM 4220 pdf,ISM 4220 quizlet,ISM 4220 reddit,ISM 4220 Answer sheet,ISM 4220 Answer key,ISM 4220 Pdf free,ISM 4220 Exam help,ISM 4220 Cheat sheet,ISM 4220 quiz bank,ISM 4220 Questions bank,ISM 4220 Practice Guide,ISM 4220 Guide,ISM 4220 Testbank,ISM 4220 Practice Answers,ISM 4220 Answers,ISM 4220 Exam prep,ISM 4220 Prep,ISM 4220 Pdf download,ISM 4220 Flashcards,ISM 4220 Real questions,ISM 4220 Actual questions,ISM 4220 Real Questions and answers,ISM 4220 Actual Questions and answers,ISM 4220 Exam review,ISM 4220 Review,ISM 4220 Exam questions,ISM 4220 Exam questions and answers,ISM 4220 Practice test pdf,ISM 4220 Practice test quizlet,ISM 4220 Practice test Reddit,ISM 4220 Practice test quizlet multiple choice,ISM 4220 Exam study guide,ISM 4220 Practice test free,ISM 4220 Test questions,ISM 4220 Exam study guide,ISM 4220 Practice exam free,ISM 4220 Practice tests free,ISM 4220 Exam practice test,ISM 4220 Exam test questions,ISM 4220 Exam questions and answers,ISM 4220 Exam practice test

Download Study Material

Buy This Study Material

$11.00
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Study Material
Description:

ISM 4220 Exam 3

UNLOCK ACCESS $11.00