Search Header Logo

IAS Finals Reviewer

Authored by Kalo ‎

Computers

University

Used 15+ times

IAS Finals Reviewer
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

method by which systems determine whether and how to admit a user into a trusted area of the organization—that is, information systems, restricted areas such as computer rooms, and the entire physical location.

Entry Control
Permission Management
User Authentication
Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network.

Firewall
Antivirus
Encryption
Router

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

private data network that uses the public telecommunications infrastructure to create a means for private communication via a tunneling protocol coupled with security procedures

Virtual Protected Network (VPN)
Virtual Public Network (VPN)
Virtual Private Network (VPN)
Virtual Personal Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In general, all access control approaches rely on the following four mechanisms, which represent the four fundamental functions of access control systems:

Identification, Authentication, Authorization,

Accountability

Authentication, Authorization, Auditing, Encryption

Identification, Validation, Permission, Monitoring

Authentication, Authorization, Auditing, Accountability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are architectural implementations of firewalls?

Single Bastion Hosts, Screened Host Firewalls, Screened Subnet Firewalls

Network-based, Host-based, Application-based

Static, Dynamic, Hybrid

Inbound, Outbound, Bothway

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The general term for a system that can both detect and modify its configuration and environment to prevent intrusions. It encompasses the functions of both intrusion detection systems and intrusion prevention technology.

Intrusion Detection and Prevention Service (IDPS)
Intrusion Detection and Prevention Software (IDPS)
Intrusion Detection and Protection System (IDPS)
Intrusion Detection and Prevention System (IDPS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm.

Data breach
Phishing attack
Malware infection

Intrusion

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?