Filters
Question type

Study Flashcards

A person calls the Draper residence and pretends to represent a credit card company.He asks Mrs.Draper to confirm her credit card number.This is an example of ________.


A) hacking
B) phishing
C) pretexting
D) sniffing

Correct Answer

verifed

verified

Viruses,worms,and Trojan horses are types of firewalls.

Correct Answer

verifed

verified

________ firewalls can prohibit outsiders from starting a session with any user behind the firewall.


A) Perimeter
B) Internal
C) Packet-filtering
D) Malware

Correct Answer

verifed

verified

________ occur when bogus services flood a Web server.


A) Spoofing attacks
B) Hacking attacks
C) Phishing attacks
D) DOS attacks

Correct Answer

verifed

verified

What is the similarity between adware and spyware?


A) Both masquerade as useful programs.
B) Both are specifically programmed to spread.
C) Both are installed without user's permission.
D) Both are used to steal data.

Correct Answer

verifed

verified

________ use(s) personal physical characteristics such as fingerprints,facial features,and retinal scans to verify users.


A) Passwords
B) Smart cards
C) Biometric authentication
D) Personal identification numbers

Correct Answer

verifed

verified

System errors are not caused by human error.

Correct Answer

verifed

verified

Backup procedures for system users include backing up Web site resources,databases,administrative data,account and password data,and other data.

Correct Answer

verifed

verified

________ is a technique for intercepting computer communications.


A) Spoofing
B) Hacking
C) Pretexting
D) Sniffing

Correct Answer

verifed

verified

Because encryption keys can get lost or destroyed,a copy of the key should be stored with a trusted third party.This safety procedure is sometimes called ________.


A) key escrow
B) white hat
C) key encryption
D) biometric authentication

Correct Answer

verifed

verified

Describe an incident-response plan.

Correct Answer

verifed

verified

Every organization should have an incide...

View Answer

Which of the following statements is true regarding position sensitivity?


A) It is a type of data safeguard.
B) It enables security personnel to prioritize their activities in accordance with the possible risk and loss.
C) It is documented only for high-sensitivity positions.
D) It applies to new employees only.

Correct Answer

verifed

verified

Distinguish between phishing,spoofing,and sniffing.

Correct Answer

verifed

verified

Phishing is a technique for obtaining un...

View Answer

________ are the patterns that exist in malware code and should be downloaded and updated frequently.


A) Data safeguards
B) Patches
C) Antivirus scans
D) Malware definitions

Correct Answer

verifed

verified

Creating backup copies of database contents is a technical safeguard.

Correct Answer

verifed

verified

Typically,a help-desk information system has answers to questions that only a true user would know,such as the user's birthplace,mother's maiden name,or last four digits of an important account number.This information ________.


A) allows help-desk representatives to create new passwords for users
B) reduces the strength of the security system
C) protects the anonymity of a user
D) helps authenticate a user

Correct Answer

verifed

verified

Pretexting occurs when someone deceives by pretending to be someone else.

Correct Answer

verifed

verified

A criticism against biometric authentication is that it provides weak authentication.

Correct Answer

verifed

verified

________ is an example of a data safeguard against security threats.


A) Application design
B) Backup and recovery
C) Accountability
D) Procedure design

Correct Answer

verifed

verified

Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.


A) usurp
B) spoof
C) hack
D) flood

Correct Answer

verifed

verified

Showing 41 - 60 of 80

Related Exams

Show Answer