A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) application controls.
B) computer operations controls.
C) hardware controls.
D) software controls.
E) administrative controls.
Correct Answer
verified
Multiple Choice
A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL,TLS,and S-HTTP.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) phishing.
B) spoofing.
C) social engineering.
D) identity theft.
E) pharming.
Correct Answer
verified
Multiple Choice
A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application's user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over
Correct Answer
verified
Multiple Choice
A) $500
B) $1,000
C) $1,250
D) $1,500
E) $2,500
Correct Answer
verified
Multiple Choice
A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) Wi-Fi networks are not vulnerable to security breaches.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.
Correct Answer
verified
Multiple Choice
A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) create access rules for a network.
Correct Answer
verified
Multiple Choice
A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.
E) recovering data from computers while preserving evidential integrity.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Trojan horse
B) Phishing emails
C) SQL injection attack
D) Computer worm
E) Pharming attack
Correct Answer
verified
Multiple Choice
A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.
Correct Answer
verified
Multiple Choice
A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in the number of computer hackers in the world.
Correct Answer
verified
Multiple Choice
A) fingerprints.
B) facial characteristics.
C) body odor.
D) retinal images.
E) voice.
Correct Answer
verified
Multiple Choice
A) smart card authentication.
B) biometric authentication.
C) two-factor authentication.
D) symmetric key authorization.
E) token authentication.
Correct Answer
verified
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) NAT
B) Packet filtering
C) Deep packet inspection
D) Stateful inspection
E) Application proxy filtering
Correct Answer
verified
Showing 41 - 60 of 100
Related Exams