Filters
Question type

Study Flashcards

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?


A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management

Correct Answer

verifed

verified

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?


A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan

Correct Answer

verifed

verified

What is a digital certificate? How does it work?

Correct Answer

verifed

verified

Digital certificates are data files used...

View Answer

Symmetric encryption uses two keys.

Correct Answer

verifed

verified

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall?


A) NAT
B) Packet filtering
C) Deep packet inspection
D) Stateful inspection
E) Application proxy filtering

Correct Answer

verifed

verified

As described in the chapter case, which of the following did hackers use to gain access to the DNC network?


A) Trojan horse
B) Phishing emails
C) SQL injection attack
D) Computer worm
E) Pharming attack

Correct Answer

verifed

verified

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:


A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.

Correct Answer

verifed

verified

Define computer forensics and describe the types of problems it is designed to address.

Correct Answer

verifed

verified

Computer forensics involves the scientif...

View Answer

All of the following are types of information systems general controls except:


A) application controls.
B) computer operations controls.
C) hardware controls.
D) software controls.
E) administrative controls.

Correct Answer

verifed

verified

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?


A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption

Correct Answer

verifed

verified

When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:


A) sniffing.
B) social engineering.
C) phishing.
D) zero-day vulnerability
E) snooping

Correct Answer

verifed

verified

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.


A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) unified threat management

Correct Answer

verifed

verified

According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately:


A) $900,000.
B) $9 million.
C) $90 million.
D) $9 billion.
E) $90 billion.

Correct Answer

verifed

verified

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

Correct Answer

verifed

verified

Student evaluations will vary, but shoul...

View Answer

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.


A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM

Correct Answer

verifed

verified

Which of the following statements about Internet security is not true?


A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.

Correct Answer

verifed

verified

A Trojan horse:


A) is software that appears to be benign but does something other than expected.
B) is a virus that replicates quickly.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.

Correct Answer

verifed

verified

Which of the following statements about passwords is not true?


A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.

Correct Answer

verifed

verified

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.


A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls

Correct Answer

verifed

verified

Implementation controls:


A) can be classified as input controls, processing controls, and output controls.
B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
D) include software controls, computer operations controls, and implementation controls.
E) Audit the systems development process at various points to ensure that the process is properly controlled and managed.

Correct Answer

verifed

verified

Showing 41 - 60 of 100

Related Exams

Show Answer