A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
E) "Authentication"
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Trojan horses that appear to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) bogus wireless network access points that look legitimate to users.
E) viruses that affect smartphones.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) $750
B) $1,000
C) $1,500
D) $2,000
E) $3,000
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) flooding a web server with thousands of requests for service.
B) setting up a fake medical website that asks users for confidential information.
C) a program that records the keystrokes on a computer.
D) sending bulk email that asks for financial aid under a false pretext.
E) malware that displays annoying pop-up messages.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Correct Answer
verified
Multiple Choice
A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) TCP/IP, SSL and CA.
B) S-HTTP, TCP/IP, and CA.
C) HTTP, TLS, and TCP/IP.
D) SSL, TLS, and S-HTTP.
E) TLS, S-HTTP, and TCP/IP
Correct Answer
verified
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) requires that companies retain electronic records for at least 10 years.
Correct Answer
verified
Multiple Choice
A) Software
B) Administrative
C) Data security
D) Implementation
E) Authentication
Correct Answer
verified
Essay
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) "Legacy systems"
B) "SSID standards"
C) "Vulnerabilities"
D) "Controls"
E) "Authentication"
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) NICs
B) Mac addresses
C) URLs
D) SSIDs
E) CAs
Correct Answer
verified
Showing 1 - 20 of 100
Related Exams