Filters
Question type

Study Flashcards

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

Correct Answer

verifed

verified

As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.

Correct Answer

verifed

verified

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that


A) are easily decrypted.
B) can be opened with easily available software.
C) may be accessible by anyone who has access to the same network.
D) are unprotected by up-to-date security systems.
E) are rarely validated.

Correct Answer

verifed

verified

The most common type of electronic evidence is


A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.
E) VOIP data.

Correct Answer

verifed

verified

In a client/server environment, corporate servers are specifically vulnerable to


A) unauthorized access.
B) sniffing.
C) malware.
D) radiation.
E) tapping.

Correct Answer

verifed

verified

Most antivirus software is effective against


A) only those viruses active on the Internet and through e-mail.
B) any virus.
C) any virus except those in wireless communications applications.
D) only those viruses already known when the software is written.
E) only viruses that are well-known and typically several years old.

Correct Answer

verifed

verified

Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?


A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500

Correct Answer

verifed

verified

The Sarbanes-Oxley Act


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

Correct Answer

verifed

verified

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called


A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
E) snooping

Correct Answer

verifed

verified

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?


A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption
E) software quality

Correct Answer

verifed

verified

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

Correct Answer

verifed

verified

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?


A) Sasser
B) Zeus Trojan
C) Melissa
D) ILOVEYOU
E) Conficker

Correct Answer

verifed

verified

Rigorous password systems


A) are one of the most effective security tools.
B) may hinder employee productivity.
C) are costly to implement.
D) are often disregarded by employees.

Correct Answer

verifed

verified

The dispersed nature of cloud computing makes it difficult to track unauthorized access.

Correct Answer

verifed

verified

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

Correct Answer

verifed

verified

In 2013, Panda Security reported approximately 30 million new kinds of malware strains.

Correct Answer

verifed

verified

The intentional defacement or destruction of a Web site is called


A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.

Correct Answer

verifed

verified

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?


A) SSL/TLS
B) symmetric key encryption
C) public key encryption
D) private key encryption
E) distributed encryption

Correct Answer

verifed

verified

How do software vendors correct flaws in their software after it has been distributed?


A) They issue bug fixes.
B) They issue patches.
C) They re-release the software.
D) They release updated versions of the software.
E) They don't; users purchase software at their own risk.

Correct Answer

verifed

verified

DoS attacks are used to destroy information and access restricted areas of a company's information system.

Correct Answer

verifed

verified

Showing 61 - 80 of 90

Related Exams

Show Answer