Filters
Question type

Study Flashcards

A password refers to "something the user is."

A) True
B) False

Correct Answer

verifed

verified

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.


A) Viruses
B) Worms
C) Trojan horses
D) Back doors
E) Logic bombs

F) C) and D)
G) B) and D)

Correct Answer

verifed

verified

Which of the following statements concerning the difficulties in protecting information resources is not correct?


A) Computing resources are typically decentralized.
B) Computer crimes often remain undetected for a long period of time.
C) Rapid technological changes ensure that controls are effective for years.
D) Employees typically do not follow security procedures when the procedures are inconvenient.
E) Computer networks can be located outside the organization.

F) B) and C)
G) B) and D)

Correct Answer

verifed

verified

Cybercriminals can obtain the information they need in order to assume another person's identity by ____________.


A) Infiltrating an organization that stores large amounts of personal information.
B) Phishing.
C) Hacking into a corporate database.
D) Stealing mail.
E) All of the choices are strategies to obtain information to assume another person's identity.

F) B) and D)
G) A) and C)

Correct Answer

verifed

verified

Access controls involve _____ before _____.


A) biometrics, signature recognition
B) authentication, authorization
C) iris scanning, voice recognition
D) strong passwords, biometrics
E) authorization, authentication

F) A) and B)
G) A) and E)

Correct Answer

verifed

verified

The computing skills necessary to be a hacker are decreasing for which of the following reasons?


A) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets.
B) Computer attack programs, called scripts, are available for download from the Internet.
C) International organized crime is training hackers.
D) Cybercrime is much more lucrative than regular white-collar crime.
E) Almost anyone can buy or access a computer today.

F) All of the above
G) A) and C)

Correct Answer

verifed

verified

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?


A) The site will not have any servers.
B) The site will not have any workstations, so you need to bring your laptop.
C) The site is probably in the next town.
D) The site should be an almost exact replica of the IT configuration at headquarters.
E) The site will not have up-to-date data.

F) All of the above
G) A) and B)

Correct Answer

verifed

verified

Which of the following is not one of the key factors that are contributing to the increasing vulnerability of organizational information resources.


A) International organized crime taking over cybercrime
B) Lack of management support
C) Increasing skills necessary to be a computer hacker.
D) Today's interconnected, interdependent, wirelessly networked business environment

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a strategy for mitigating the risk of threats against information?


A) Continue operating with no controls and absorb any damages that occur
B) Transfer the risk by purchasing insurance.
C) Implement controls that minimize the impact of the threat
D) Install controls that block the risk.
E) Installing an updated operating system.

F) All of the above
G) None of the above

Correct Answer

verifed

verified

An information system's _____ is the possibility that the system will be harmed by a threat.


A) vulnerability
B) risk
C) control
D) danger
E) compromise

F) C) and D)
G) A) and E)

Correct Answer

verifed

verified

The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their warm site to minimize downtime should such a disaster hit. Which of the following statements is true?


A) The site will not have any servers.
B) The site will not have any workstations, so you need to bring your laptop.
C) The site is probably in the next town.
D) The site will not have any of the company's applications.
E) The site will not have up-to-date data.

F) C) and E)
G) B) and D)

Correct Answer

verifed

verified

Organizations utilize layers of controls because they face so many diverse threats to information security.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements concerning firewalls is false?


A) Firewalls prevent unauthorized Internet users from accessing private networks.
B) Firewalls examine every message that enters or leaves an organization's network.
C) Firewalls filter network traffic according to categories of activities that are likely to cause problems.
D) Firewalls filter messages the same way as anti-malware systems do.
E) Firewalls are sometimes located inside an organization's private network.

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.


A) Zero-day
B) Denial-of-service
C) Distributed denial-of-service
D) Phishing
E) Brute force dictionary

F) A) and B)
G) A) and E)

Correct Answer

verifed

verified

Dumpster diving is always illegal because it involves trespassing on private property.

A) True
B) False

Correct Answer

verifed

verified

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.


A) Alien software
B) Virus
C) Worm
D) Back door
E) Logic bomb

F) All of the above
G) B) and C)

Correct Answer

verifed

verified

Voice recognition is an example of "something a user does" authentication.

A) True
B) False

Correct Answer

verifed

verified

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

A) True
B) False

Correct Answer

verifed

verified

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a Post It note and put it on your laptop screen. This is an example of ________________.


A) social engineering.
B) tailgating.
C) poor security.
D) dumpster diving
E) phishing.

F) C) and D)
G) B) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 87

Related Exams

Show Answer