Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) are easily decrypted.
B) can be opened with easily available software.
C) may be accessible by anyone who has access to the same network.
D) are unprotected by up-to-date security systems.
E) are rarely validated.
Correct Answer
verified
Multiple Choice
A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.
E) VOIP data.
Correct Answer
verified
Multiple Choice
A) unauthorized access.
B) sniffing.
C) malware.
D) radiation.
E) tapping.
Correct Answer
verified
Multiple Choice
A) only those viruses active on the Internet and through e-mail.
B) any virus.
C) any virus except those in wireless communications applications.
D) only those viruses already known when the software is written.
E) only viruses that are well-known and typically several years old.
Correct Answer
verified
Multiple Choice
A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500
Correct Answer
verified
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
E) snooping
Correct Answer
verified
Multiple Choice
A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption
E) software quality
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sasser
B) Zeus Trojan
C) Melissa
D) ILOVEYOU
E) Conficker
Correct Answer
verified
Multiple Choice
A) are one of the most effective security tools.
B) may hinder employee productivity.
C) are costly to implement.
D) are often disregarded by employees.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.
Correct Answer
verified
Multiple Choice
A) SSL/TLS
B) symmetric key encryption
C) public key encryption
D) private key encryption
E) distributed encryption
Correct Answer
verified
Multiple Choice
A) They issue bug fixes.
B) They issue patches.
C) They re-release the software.
D) They release updated versions of the software.
E) They don't; users purchase software at their own risk.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 90
Related Exams