Filters
Question type

Study Flashcards

Organizations can use existing network security software to secure mobile devices.

Correct Answer

verifed

verified

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called


A) smart card authentication.
B) biometric authentication.
C) two-factor authentication.
D) symmetric key authorization.
E) token authentication.

Correct Answer

verifed

verified

________ is malware that hijacks a user's computer and demands payment in return for giving back access.


A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin

Correct Answer

verifed

verified

SSL is a protocol used to establish a secure connection between two computers.

Correct Answer

verifed

verified

Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?


A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500

Correct Answer

verifed

verified

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.


A) Software
B) Administrative
C) Data security
D) Implementation
E) Input

Correct Answer

verifed

verified

Which of the following is not an example of a computer used as a target of crime?


A) knowingly accessing a protected computer to commit fraud
B) sccessing a computer system without authority
C) illegally accessing stored electronic communication
D) threatening to cause damage to a protected computer
E) breaching the confidentiality of protected computerized data

Correct Answer

verifed

verified

Client software in a client/server environment is specifically vulnerable to


A) DoS attacks.
B) vandalism.
C) fraud.
D) radiation.
E) unauthorized access.

Correct Answer

verifed

verified

What are the security challenges faced by wireless networks?

Correct Answer

verifed

verified

Wireless networks are vulnerable because...

View Answer

A computer virus replicates more quickly than a computer worm.

Correct Answer

verifed

verified

Which of the following is a type of ambient data?


A) computer log containing recent system errors
B) a file deleted from a hard disk
C) a file that contains an application's user settings
D) a set of raw data from an environmental sensor
E) data that has been recorded over

Correct Answer

verifed

verified

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as


A) war driving.
B) sniffing.
C) cybervandalism.
D) drive-by tapping.
E) snooping.

Correct Answer

verifed

verified

Viruses can be spread through e-mail.

Correct Answer

verifed

verified

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

Correct Answer

verifed

verified

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that


A) are easily decrypted.
B) can be opened with easily available software.
C) may be accessible by anyone who has access to the same network.
D) are unprotected by up-to-date security systems.
E) are rarely validated.

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

Correct Answer

verifed

verified

Hackers create a botnet by


A) infecting Web search bots with malware.
B) using Web search bots to infect other computers.
C) causing other people's computers to become "zombie" PCs following a master computer.
D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.
E) pharming multiple computers.

Correct Answer

verifed

verified

All of the following are types of information systems general controls except


A) application controls.
B) computer operations controls.
C) physical hardware controls.
D) software controls.
E) administrative controls

Correct Answer

verifed

verified

You can test software before it is even written by conducting a walkthrough.

Correct Answer

verifed

verified

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

Correct Answer

verifed

verified

Student evaluations will vary, but shoul...

View Answer

Showing 21 - 40 of 90

Related Exams

Show Answer