Filters
Question type

Study Flashcards

Output controls check data for accuracy and completeness when they enter the system.

Correct Answer

verifed

verified

One increasingly popular tactic is a form of spoofing called phishing.

Correct Answer

verifed

verified

How do hackers create a botnet?


A) by infecting Web search bots with malware
B) by using Web search bots to infect other computers
C) by causing other people's computers to become "zombie" PCs following a master computer
D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door

Correct Answer

verifed

verified

A hacker is an individual who intends to gain unauthorized access to a computer system.

Correct Answer

verifed

verified

Many Wi-Fi networks can be penetrated easily by intruders using ________ programs to obtain an address to access the resources of a network without authorization.


A) phishing
B) sniffer
C) pharming
D) encryption

Correct Answer

verifed

verified

Businesses must protect not only their own information assets but also those of ________.


A) customers.employees,and competitors
B) competitors.employees,and business partners
C) customers.competitors and business partners
D) customers.employees,and business partners

Correct Answer

verifed

verified

The term ________ is typically used to denote a hacker with criminal intent.

Correct Answer

verifed

verified

Businesses must protect only their own information assets but not those of customers,employees,and business partners.

Correct Answer

verifed

verified

Robert knows that he got an independent program off of his network on his computer.It deleted all of his spreadsheet files on his hard drive.Robert feels that this problem may have resulted from him opening up an attachment file on his e-mail.Robert is the victim of ________.


A) spoofing
B) keyloggers
C) a Trojan horse
D) worms

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

Correct Answer

verifed

verified

Computer forensics is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

Correct Answer

verifed

verified

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

Correct Answer

verifed

verified

On the whole,________ controls apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.

Correct Answer

verifed

verified

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

Correct Answer

verifed

verified

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.


A) defragmented
B) ambient
C) forensic
D) recovery

Correct Answer

verifed

verified

Specific security challenges that threaten the communications lines in a client/server environment include


A) tapping;sniffing;message alteration;radiation.
B) hacking;vandalism;denial of service attacks.
C) theft,copying,alteration of data;hardware or software failure.
D) unauthorized access;errors;spyware.

Correct Answer

verifed

verified

The most common type of electronic evidence is


A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.

Correct Answer

verifed

verified

Computer crime is defined as "any criminal activity involving the copy of,use of,removal of,interference with,access to,manipulation of computer systems,and/or their related functions,data or programs."

Correct Answer

verifed

verified

Phishing involves


A) setting up bogus Wi-Fi hot spots.
B) setting up fake Web sites to ask users for confidential information.
C) pretending to be a legitimate business's representative in order to garner information about a security system.
D) using e-mails for threats or harassment.

Correct Answer

verifed

verified

SSL is a protocol used to establish a secure connection between two computers.

Correct Answer

verifed

verified

Showing 121 - 140 of 202

Related Exams

Show Answer