Correct Answer
verified
Multiple Choice
A) patches.
B) adware.
C) maculations.
D) keys.
E) cracks.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Mandate the use of industry-standard software alone on company hardware
B) Implement frequent overhaul of hardware
C) Dispose of used hardware after annual audits
D) Regularly initiate software auditing
E) Regularly reimage the hard-drives of end user PCs
Correct Answer
verified
Multiple Choice
A) Spyware
B) Malware
C) Social engineering
D) Phishing
E) Virus infections
Correct Answer
verified
Multiple Choice
A) allots domain names to different Web sites.
B) assigns IP addresses to different systems.
C) directs the flow of traffic across the Internet.
D) maintains a registry of different IP addresses.
E) maps an Internet address to an IP address.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) security breaches are not as damaging to companies as other crimes are.
B) industry guidelines for information security are not suitable for everyone and should be made optional.
C) information security must be a top organizational priority.
D) skimping on liability insurance to cover for financial losses from security breaches is not advisable.
E) with a little effort and resources, it is possible to make any security system hundred percent foolproof.
Correct Answer
verified
Multiple Choice
A) the rising cost of labor.
B) lack of information on effectiveness of patches.
C) the fear that the new technology contains a change that will cause problems down the road.
D) redundancy of patches within a short span of time.
E) bureaucratic inefficiency.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) clients.
B) technology providers and contract firms.
C) law-enforcement agencies.
D) government regulatory bodies.
E) international standards organizations.
Correct Answer
verified
Multiple Choice
A) Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies.
B) Law-enforcement agencies are well-resourced to fight cyber-crimes effectively.
C) Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay.
D) Law-enforcement agencies employ technically inept employees who are incapable of keeping pace with today's cyber-criminals.
E) Cyber-crime is not rewarding in terms of financial gain.
Correct Answer
verified
Multiple Choice
A) clogs up network traffic and disables networks.
B) monitors user actions or scans for files surreptitiously.
C) infects other software and decreases the network speeds.
D) serves up unwanted advertisements after being installed without user knowledge.
E) scans for loopholes in other software and releases malware payloads.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) overlamination processes
B) biometrics
C) smart tags
D) bio-embedded systems
E) holographs
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 90
Related Exams