Filters
Question type

Study Flashcards

An authentication token:


A) is a device the size of a credit card that contains access permission data.
B) is a type of smart card.
C) is a device that displays passcodes.
D) is an electronic marker attached to a digital authorization file.
E) compares a person's unique characteristics against a stored profile of these characteristics to determine any differences between these characteristics and the stored profile.

F) D) and E)
G) A) and E)

Correct Answer

verifed

verified

Viruses cannot be spread through email.

A) True
B) False

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

A) True
B) False

Correct Answer

verifed

verified

For 100 percent availability, online transaction processing requires:


A) high-capacity storage.
B) a multi-tier server network.
C) fault-tolerant computer systems.
D) dedicated phone lines.
E) deep packet inspection.

F) C) and E)
G) A) and D)

Correct Answer

verifed

verified

All of the following countries are popular sources of malware attacks except:


A) the Netherlands.
B) the United Kingdom.
C) the United States.
D) Germany.
E) Mexico.

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

A digital certificate system:


A) uses third-party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.
E) uses deep packet inspection to validate a user's identity.

F) A) and E)
G) B) and E)

Correct Answer

verifed

verified

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

Correct Answer

verifed

verified

Student answers will vary. Example answe...

View Answer

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) :


A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
E) What-if analysis.

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

Which of the following focuses primarily on the technical issues of keeping systems up and running?


A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit

F) B) and D)
G) A) and E)

Correct Answer

verifed

verified

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.


A) Identity theft
B) Spoofing
C) Social engineering
D) Evil twins
E) Cybervandalism

F) A) and E)
G) C) and D)

Correct Answer

verifed

verified

SSL is a protocol used to establish a secure connection between two computers.

A) True
B) False

Correct Answer

verifed

verified

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.


A) DDoS
B) DoS
C) SQL injection
D) phishing
E) ransomware

F) D) and E)
G) A) and E)

Correct Answer

verifed

verified

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?


A) TLS
B) AUP
C) VPN
D) WPA2
E) S-HTTP

F) B) and D)
G) B) and E)

Correct Answer

verifed

verified

CryptoLocker is an example of which of the following?


A) Trojan Horse
B) SQL injection attack
C) Sniffer
D) Evil twin
E) Ransomware

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?


A) SSL
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) TLS

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

Computer forensics tasks include all of the following except:


A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.
E) recovering data from computers while preserving evidential integrity.

F) A) and C)
G) A) and E)

Correct Answer

verifed

verified

Pharming involves:


A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake websites to ask users for confidential information.
D) using emails for threats or harassment.
E) malware that displays annoying pop-up messages.

F) B) and D)
G) All of the above

Correct Answer

verifed

verified

A firewall allows the organization to:


A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) authenticate users.

F) C) and E)
G) B) and E)

Correct Answer

verifed

verified

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

A) True
B) False

Correct Answer

verifed

verified

DoS attacks are used to destroy information and access restricted areas of a company's information system.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 100

Related Exams

Show Answer