Filters
Question type

Study Flashcards

The Sarbanes-Oxley Act:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

Correct Answer

verifed

verified

All of the following are types of information systems general controls except:


A) application controls.
B) computer operations controls.
C) hardware controls.
D) software controls.
E) administrative controls.

Correct Answer

verifed

verified

Currently,the protocols used for secure information transfer over the Internet are:


A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL,TLS,and S-HTTP.

Correct Answer

verifed

verified

Smartphones do not have the same security flaws as other Internet-connected devices.

Correct Answer

verifed

verified

When hackers gain access to a database containing your personal private information,this is an example of:


A) phishing.
B) spoofing.
C) social engineering.
D) identity theft.
E) pharming.

Correct Answer

verifed

verified

Which of the following is a type of ambient data?


A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application's user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over

Correct Answer

verifed

verified

Your company,an online discount pet supply store,has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year.What is the annual expected loss from this exposure?


A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500

Correct Answer

verifed

verified

Which of the following statements about Internet security is not true?


A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) Wi-Fi networks are not vulnerable to security breaches.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.

Correct Answer

verifed

verified

A firewall allows the organization to:


A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) create access rules for a network.

Correct Answer

verifed

verified

A foreign country attempting to access government networks in order to disable a national power grid is an example of:


A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.

Correct Answer

verifed

verified

A computer worm is a program that can copy itself to other computers on the network.

Correct Answer

verifed

verified

Computer forensics tasks include all of the following except:


A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.
E) recovering data from computers while preserving evidential integrity.

Correct Answer

verifed

verified

Most IoT devices support sophisticated security approaches.

Correct Answer

verifed

verified

As described in the chapter case,which of the following did hackers use to gain access to the Democratic National Committee (DNC) network?


A) Trojan horse
B) Phishing emails
C) SQL injection attack
D) Computer worm
E) Pharming attack

Correct Answer

verifed

verified

Which of the following statements about botnets is not true?


A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.

Correct Answer

verifed

verified

All of the following have contributed to an increase in software flaws except:


A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in the number of computer hackers in the world.

Correct Answer

verifed

verified

All of the following are currently being used as traits that can be profiled by biometric authentication except:


A) fingerprints.
B) facial characteristics.
C) body odor.
D) retinal images.
E) voice.

Correct Answer

verifed

verified

An authentication system in which a user must provide two types of identification,such as a bank card and PIN,is called:


A) smart card authentication.
B) biometric authentication.
C) two-factor authentication.
D) symmetric key authorization.
E) token authentication.

Correct Answer

verifed

verified

The Gramm-Leach-Bliley Act:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

Correct Answer

verifed

verified

Which of the following techniques stops data packets originating outside the organization,inspects them,and passes the packets to the other side of an organization's firewall?


A) NAT
B) Packet filtering
C) Deep packet inspection
D) Stateful inspection
E) Application proxy filtering

Correct Answer

verifed

verified

Showing 41 - 60 of 100

Related Exams

Show Answer