Filters
Question type

Study Flashcards

The concept of _______, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

Correct Answer

verifed

verified

reasonable...

View Answer

Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?


A) ​Messages from the IDS are routed to the network security team
B) ​The IDS warns the firewall of suspicious traffic
C) The network router sends traffic to the firewall as well as to the IDS
D) Network security team decides to block traffic from that IP address

Correct Answer

verifed

verified

A hacktivist is someone who _______.


A) ​attempts to gain financially and/or disrupt a company's information systems and business operations
B) hacks computers or Web sites in an attempt to promote a political ideology
C) attempts to destroy the infrastructure components of governments
D) violates computer or Internet security maliciously or for illegal personal gain

Correct Answer

verifed

verified

Default usernames and passwords should always be changed.

Correct Answer

verifed

verified

An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.

Correct Answer

verifed

verified

In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.

Correct Answer

verifed

verified

Even legitimate organizations sometimes use email spam for promoting products.

Correct Answer

verifed

verified

A botnet is a ____.


A) network of robots that control an assembly line at a factory
B) network of servers that exchange traffic data
C) ​network of devices that are used for managing security
D) ​network of computers that send out access requests to servers repeatedly

Correct Answer

verifed

verified

Which of the following shortcoming may be revealed during an IT security audit?


A) ​whether the IT budget is adequate or not
B) ​whether the users are satisfied with IT services or not
C) whether only a limited number of people have access to critical data or not
D) whether the firewall is tall enough

Correct Answer

verifed

verified

A ________ often creates a "backdoor" on a computer that enables an attacker to gain access to the system and compromise confidential or private information.

Correct Answer

verifed

verified

You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress.

Correct Answer

verifed

verified

A zombie computer would send requests to access to the target site again and again.

Correct Answer

verifed

verified

Which of these organizations offers guidelines on developing security policies?


A) ​DHS
B) ​SANS
C) ​IBM
D) ​CISCO

Correct Answer

verifed

verified

Which of the following is a vendor of popular anti-virus software?


A) ​Microsoft
B) ​Symantec
C) ​McDonald's
D) ​Bayer

Correct Answer

verifed

verified

It is not uncommon for computer users to share their login ID and password with coworkers.

Correct Answer

verifed

verified

Which of the following subject areas does the USA Patriot Act cover?


A) ​Cyberterrorism
B) ​Identity theft
C) Credit card fraud
D) Transmitting virus programs

Correct Answer

verifed

verified

A(n) _______ is an individual who captures trade secrets and attempts to gain an unfair competitive advantage.

Correct Answer

verifed

verified

_____ is similar to SMiShing except that the victims receive a voice mail message telling them to call a phone number or access a Web site.

Correct Answer

verifed

verified

You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.

Correct Answer

verifed

verified

A strong security program begins by assessing the backgrounds of the employees in the organization.

Correct Answer

verifed

verified

Showing 21 - 40 of 85

Related Exams

Show Answer