Filters
Question type

________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.


A) Key loggers
B) Trojan horses
C) Worms
D) Payloads

Correct Answer

verifed

verified

With https, data are encrypted using a protocol called the ________.


A) Secure Shell (SSH)
B) Secure Sockets Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)

Correct Answer

verifed

verified

________ are small files that browsers store on users' computers when they visit Web sites.


A) Cookies
B) Honeypots
C) Mashups
D) Entity tags

Correct Answer

verifed

verified

As one of the safeguards against security threats, a person should preferably use the same password for different sites so as to avoid confusion.

Correct Answer

verifed

verified

A(n) ________ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.


A) application design
B) activity log
C) systems procedure
D) incident-response plan

Correct Answer

verifed

verified

After Equifax was hacked, they went through ________ process to reduced the system's vulnerability.


A) a cleansing project
B) a new management hiring process
C) a hardening
D) a honeypot process

Correct Answer

verifed

verified

Technical safeguards involve both software and hardware components of an information system.

Correct Answer

verifed

verified

Which of the following is a primary means of authentication?


A) passwords
B) fingerprints
C) hardening
D) termination

Correct Answer

verifed

verified

Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.


A) human safeguards
B) data safeguards
C) technical safeguards
D) hardware safeguards

Correct Answer

verifed

verified

A key is a number used with an encryption algorithm to encrypt data.

Correct Answer

verifed

verified

Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?


A) authentication
B) identification
C) decryption
D) encryption

Correct Answer

verifed

verified

The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.


A) key escrow
B) pledged encryption
C) insured encryption
D) key replication

Correct Answer

verifed

verified

A criticism of biometric authentication is that it provides weak authentication.

Correct Answer

verifed

verified

All of the following are factors in incident response EXCEPT ________.


A) have a plan in place
B) practice
C) don't make the problem worse
D) take your time responding to the incident

Correct Answer

verifed

verified

Which of the following is a human safeguard against security threats?


A) encryption
B) firewall
C) physical security
D) procedure design

Correct Answer

verifed

verified

Risk management is a critical security function addressed by an organization's senior management.

Correct Answer

verifed

verified

The _________ can delete programs or data or even modify data in undetected ways.


A) virus
B) trojan horse
C) payload
D) spyware

Correct Answer

verifed

verified

________ a site means to take extraordinary measures to reduce a system's vulnerability.


A) Pretexting
B) Hacking
C) Spoofing
D) Hardening

Correct Answer

verifed

verified

IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.

Correct Answer

verifed

verified

Spoofing is a technique for intercepting computer communications.

Correct Answer

verifed

verified

Showing 21 - 40 of 118

Related Exams

Show Answer