Filters
Question type

Study Flashcards

Companies should require vendors and partners to perform appropriate screening and security training.

A) True
B) False

Correct Answer

verifed

verified

Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.

A) True
B) False

Correct Answer

verifed

verified

Describe the magnitude of security problems in the present day.

Correct Answer

verifed

verified

The full extent of the financial and dat...

View Answer

Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements is true of biometric identification?


A) It involves the use of a PIN for authentication.
B) It provides weak authentication.
C) It is a relatively inexpensive mode of authentication.
D) It often faces resistance from users for its invasive nature.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.


A) payload
B) kernel
C) bot herder
D) key escrow

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ________ has a microchip in it to hold data.


A) ATM card
B) smart card
C) cookie
D) key escrow

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is an example of a sniffing technique?


A) IP spoofing
B) caches
C) denial of service
D) adware

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

________ are viruses that masquerade as useful programs or files.


A) Adware programs
B) Spyware programs
C) Trojan horses
D) Worms

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

In information security, which of the following is true of managing risk?


A) All organizations except financial institutions should invest heavily in security safeguards.
B) Organizations should implement safeguards that balance the trade-off between risk and cost.
C) Passwords are classified under the technical safeguards category.
D) Physical security is classified under the human safeguards category.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

________ involve the people and procedure components of information systems.


A) Firewalls
B) Technical safeguards
C) Human safeguards
D) Payloads

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is key escrow?

Correct Answer

verifed

verified

Key escrow is a safety procedure. Organi...

View Answer

Unauthorized data disclosures are possible due to human error.

A) True
B) False

Correct Answer

verifed

verified

Hardening a site means to take extraordinary measures to reduce a system's vulnerability.

A) True
B) False

Correct Answer

verifed

verified

Packet-filtering firewalls ________.


A) can filter both inbound and outbound traffic
B) examine the destination address but not the source address
C) are the most complex type of firewall
D) seldom examine the data or the addresses of the message

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Pretexting occurs when a person receives a confidential text message by mistake.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements is true with regard to human safeguards?


A) System administrators should retain user accounts after an employee has been terminated.
B) All employees must be provided with uniform, general training on security, regardless of their position's sensitivity.
C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
D) Holding public users of Web sites accountable for security violations is quite easy and inexpensive.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.


A) bookmarks
B) pop-ups
C) cookies
D) toolbars

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

It is safer to use the same password for all the Web sites.

A) True
B) False

Correct Answer

verifed

verified

Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 123

Related Exams

Show Answer