Correct Answer
verified
Multiple Choice
A) Viruses
B) Worms
C) Trojan horses
D) Back doors
E) Logic bombs
Correct Answer
verified
Multiple Choice
A) Computing resources are typically decentralized.
B) Computer crimes often remain undetected for a long period of time.
C) Rapid technological changes ensure that controls are effective for years.
D) Employees typically do not follow security procedures when the procedures are inconvenient.
E) Computer networks can be located outside the organization.
Correct Answer
verified
Multiple Choice
A) Infiltrating an organization that stores large amounts of personal information.
B) Phishing.
C) Hacking into a corporate database.
D) Stealing mail.
E) All of the choices are strategies to obtain information to assume another person's identity.
Correct Answer
verified
Multiple Choice
A) biometrics, signature recognition
B) authentication, authorization
C) iris scanning, voice recognition
D) strong passwords, biometrics
E) authorization, authentication
Correct Answer
verified
Multiple Choice
A) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.
B) Computer attack programs, called scripts, are available for download from the Internet.
C) International organized crime is training hackers.
D) Cybercrime is much more lucrative than regular white-collar crime.
E) Almost anyone can buy or access a computer today.
Correct Answer
verified
Multiple Choice
A) The site will not have any servers.
B) The site will not have any workstations, so you need to bring your laptop.
C) The site is probably in the next town.
D) The site should be an almost exact replica of the IT configuration at headquarters.
E) The site will not have up-to-date data.
Correct Answer
verified
Multiple Choice
A) International organized crime taking over cybercrime
B) Lack of management support
C) Increasing skills necessary to be a computer hacker.
D) Today's interconnected, interdependent, wirelessly networked business environment
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Continue operating with no controls and absorb any damages that occur
B) Transfer the risk by purchasing insurance.
C) Implement controls that minimize the impact of the threat
D) Install controls that block the risk.
E) Installing an updated operating system.
Correct Answer
verified
Multiple Choice
A) vulnerability
B) risk
C) control
D) danger
E) compromise
Correct Answer
verified
Multiple Choice
A) The site will not have any servers.
B) The site will not have any workstations, so you need to bring your laptop.
C) The site is probably in the next town.
D) The site will not have any of the company's applications.
E) The site will not have up-to-date data.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Firewalls prevent unauthorized Internet users from accessing private networks.
B) Firewalls examine every message that enters or leaves an organization's network.
C) Firewalls filter network traffic according to categories of activities that are likely to cause problems.
D) Firewalls filter messages the same way as anti-malware systems do.
E) Firewalls are sometimes located inside an organization's private network.
Correct Answer
verified
Multiple Choice
A) Zero-day
B) Denial-of-service
C) Distributed denial-of-service
D) Phishing
E) Brute force dictionary
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Alien software
B) Virus
C) Worm
D) Back door
E) Logic bomb
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) social engineering.
B) tailgating.
C) poor security.
D) dumpster diving
E) phishing.
Correct Answer
verified
Showing 21 - 40 of 87
Related Exams