Filters
Question type

Study Flashcards

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.


A) hacker
B) phisher
C) safeguard
D) sniffer

Correct Answer

verifed

verified

Which of the following systems procedures is specifically the responsibility of operations personnel?


A) writing software program codes
B) using systems to perform job tasks
C) creating back up of system databases
D) knowing whom to contact when a security breach occurs

Correct Answer

verifed

verified

Symmetric encryption is simpler and much faster than asymmetric encryption.

Correct Answer

verifed

verified

If a backup of the database contents is created, the database is completely protected.

Correct Answer

verifed

verified

________ is a broad category of software that includes viruses, spyware, and adware.


A) Malware
B) Cookie
C) Firewall
D) Spam

Correct Answer

verifed

verified

Which of the following statements is True about the Secure Sockets Layer (SSL) ?


A) It uses asymmetric encryption exclusively.
B) It is used to send sensitive data such as credit card numbers.
C) It uses one set of encryption keys for multiple sessions.
D) It is a stronger version of https.

Correct Answer

verifed

verified

List various personal security safeguards.

Correct Answer

verifed

verified

The various personal security safeguards...

View Answer

Hardening is actually a human safeguard.

Correct Answer

verifed

verified

A(n) ________ has a microchip in it to hold data.


A) ATM card
B) smart card
C) cookie
D) key escrow

Correct Answer

verifed

verified

Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

Correct Answer

verifed

verified

In the context of information security, safeguards increase work efficiency by making common tasks easier.

Correct Answer

verifed

verified

Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.

Correct Answer

verifed

verified

Which of the following statements is True about the position definitions component of human safeguards?


A) System administrators should retain user accounts after an employee has been terminated.
B) All employees must be provided with uniform, general training on security regardless of the sensitivity of their positions.
C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
D) Holding public users of Web sites accountable for security violations is easy and inexpensive.

Correct Answer

verifed

verified

Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.

Correct Answer

verifed

verified

________ present(s) the largest risk for an organization's infrastructure loss.


A) Employees' dissatisfaction
B) Natural disasters
C) Hackers
D) Competitors

Correct Answer

verifed

verified

A ________ is a number used to encrypt data.


A) key
B) honeypot
C) cookie
D) cache

Correct Answer

verifed

verified

In symmetric encryption, two different keys are used to encode and decode a message.

Correct Answer

verifed

verified

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?


A) the Privacy Act of 1974
B) the Sarbanes-Oxley Act
C) the HIPAA of 1996
D) the Gramm-Leach-Bliley Act

Correct Answer

verifed

verified

What is the basic information that a security policy must stipulate?

Correct Answer

verifed

verified

At a minimum, a security policy should s...

View Answer

A ________ is a type of virus that self-propagates using the Internet or other computer network.


A) worm
B) sniffer
C) Trojan horse
D) phisher

Correct Answer

verifed

verified

Showing 41 - 60 of 123

Related Exams

Show Answer