Correct Answer
verified
Multiple Choice
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.
Correct Answer
verified
Multiple Choice
A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) uses third-party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.
Correct Answer
verified
Multiple Choice
A) application proxy filtering
B) static packet filtering
C) NAT
D) secure socket filtering
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) retinal image
B) voice
C) hair color
D) face
Correct Answer
verified
Multiple Choice
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) it was designed to be easily accessible.
B) Internet data is not run over secure lines.
C) Internet standards are universal.
D) it changes so rapidly.
Correct Answer
verified
Multiple Choice
A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake Web sites to ask users for confidential information.
D) using e-mails for threats or harassment.
Correct Answer
verified
Multiple Choice
A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) setting up a bogus Wi-Fi hot spot.
B) setting up a fake medical Web site that asks users for confidential information.
C) pretending to be a utility company's employee in order to garner information from that company about their security system.
D) sending bulk e-mail that asks for financial aid under a False pretext.
Correct Answer
verified
Showing 21 - 40 of 90
Related Exams