Filters
Question type

Study Flashcards

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

Correct Answer

verifed

verified

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.


A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"

Correct Answer

verifed

verified

Viruses can be spread through e-mail.

Correct Answer

verifed

verified

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called


A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.

Correct Answer

verifed

verified

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called


A) sniffing.
B) social engineering.
C) phishing.
D) pharming.

Correct Answer

verifed

verified

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

Correct Answer

verifed

verified

A(n) ________ examines the firm's overall security environment as well as the controls governing individual information systems.

Correct Answer

verifed

verified

Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used?

Correct Answer

verifed

verified

Both systems use backup hardware resourc...

View Answer

A digital certificate system


A) uses third-party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.

Correct Answer

verifed

verified

Which of the following is not one of the main firewall screening techniques?


A) application proxy filtering
B) static packet filtering
C) NAT
D) secure socket filtering

Correct Answer

verifed

verified

Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.

Correct Answer

verifed

verified

Which of the following is not a trait used for identification in biometric systems?


A) retinal image
B) voice
C) hair color
D) face

Correct Answer

verifed

verified

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)


A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.

Correct Answer

verifed

verified

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

Correct Answer

verifed

verified

The Internet poses specific security problems because


A) it was designed to be easily accessible.
B) Internet data is not run over secure lines.
C) Internet standards are universal.
D) it changes so rapidly.

Correct Answer

verifed

verified

Pharming involves


A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake Web sites to ask users for confidential information.
D) using e-mails for threats or harassment.

Correct Answer

verifed

verified

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?


A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption

Correct Answer

verifed

verified

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

Correct Answer

verifed

verified

1. Establish what data and processes are...

View Answer

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

Correct Answer

verifed

verified

(1) Operational excellence: Security pol...

View Answer

An example of phishing is


A) setting up a bogus Wi-Fi hot spot.
B) setting up a fake medical Web site that asks users for confidential information.
C) pretending to be a utility company's employee in order to garner information from that company about their security system.
D) sending bulk e-mail that asks for financial aid under a False pretext.

Correct Answer

verifed

verified

Showing 21 - 40 of 90

Related Exams

Show Answer