Filters
Question type

Study Flashcards

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.


A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
E) "Authentication"

F) B) and C)
G) All of the above

Correct Answer

verifed

verified

According to IT security experts, mobile devices pose greater security risks than larger computers.

A) True
B) False

Correct Answer

verifed

verified

Evil twins are:


A) Trojan horses that appear to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) bogus wireless network access points that look legitimate to users.
E) viruses that affect smartphones.

F) C) and D)
G) C) and E)

Correct Answer

verifed

verified

Zeus is an example of a Trojan horse.

A) True
B) False

Correct Answer

verifed

verified

Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss from this exposure?


A) $750
B) $1,000
C) $1,500
D) $2,000
E) $3,000

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

Malicious software programs referred to as malware include a variety of threats such as computer viruses, worms, and Trojan horses.

A) True
B) False

Correct Answer

verifed

verified

An example of phishing is:


A) flooding a web server with thousands of requests for service.
B) setting up a fake medical website that asks users for confidential information.
C) a program that records the keystrokes on a computer.
D) sending bulk email that asks for financial aid under a false pretext.
E) malware that displays annoying pop-up messages.

F) A) and B)
G) B) and E)

Correct Answer

verifed

verified

One form of spoofing involves forging the return address on an email so that the email message appears to come from someone other than the sender.

A) True
B) False

Correct Answer

verifed

verified

Most computer viruses deliver a:


A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.

F) A) and D)
G) None of the above

Correct Answer

verifed

verified

Which of the following statements about wireless security is not true?


A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

F) C) and E)
G) B) and D)

Correct Answer

verifed

verified

E

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

A) True
B) False

Correct Answer

verifed

verified

Currently, the protocols used for secure information transfer over the Internet are:


A) TCP/IP, SSL and CA.
B) S-HTTP, TCP/IP, and CA.
C) HTTP, TLS, and TCP/IP.
D) SSL, TLS, and S-HTTP.
E) TLS, S-HTTP, and TCP/IP

F) C) and D)
G) B) and D)

Correct Answer

verifed

verified

The Gramm-Leach-Bliley Act:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) requires that companies retain electronic records for at least 10 years.

F) A) and C)
G) A) and B)

Correct Answer

verifed

verified

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.


A) Software
B) Administrative
C) Data security
D) Implementation
E) Authentication

F) A) and B)
G) A) and E)

Correct Answer

verifed

verified

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

Correct Answer

verifed

verified

For protection, a company must institute good security measures, which will include firewalls, investigation of personnel to be hired, physical and software security and controls, antivirus software, and internal education measures. These measures are best put in place at the time the system is designed, and careful attention paid to them. A prudent company will engage in disaster protection measures, frequent updating of security software, and frequent auditing of all security measures and of all data upon which the company depends. Full protection may not be feasible in light of the time and expenses involved, but a risk analysis can provide insights into which areas are most important and vulnerable. These are the areas to protect first.

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

A) True
B) False

Correct Answer

verifed

verified

An acceptable use policy defines the acceptable level of access to information assets for different users.

A) True
B) False

Correct Answer

verifed

verified

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.


A) "Legacy systems"
B) "SSID standards"
C) "Vulnerabilities"
D) "Controls"
E) "Authentication"

F) A) and E)
G) A) and D)

Correct Answer

verifed

verified

D

To secure mobile devices, a company will need to implement special mobile device management software.

A) True
B) False

Correct Answer

verifed

verified

________ identify the access points in a Wi-Fi network.


A) NICs
B) Mac addresses
C) URLs
D) SSIDs
E) CAs

F) B) and D)
G) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 100

Related Exams

Show Answer