Filters
Question type

Study Flashcards

To safeguard data against security threats,every information system today requires a user name and a password.In this case,which of the following functions is performed by the user name?


A) authentication
B) identification
C) decryption
D) encryption

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a human safeguard against security threats?


A) encryption
B) firewall
C) physical security
D) procedure design

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The loss of encryption keys by employees is referred to as key escrow.

A) True
B) False

Correct Answer

verifed

verified

Wardrivers are those who engage in phishing to obtain unauthorized access to data.

A) True
B) False

Correct Answer

verifed

verified

In the case of public key encryption,each site has a private key to encode a message and a public key to decode it.

A) True
B) False

Correct Answer

verifed

verified

A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.


A) hacking
B) data mining
C) pretexting
D) sniffing

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?


A) centralized reporting,preparation,and practice
B) hiring,screening,and terminating
C) separation of duties,provision of maximum privilege,and position sensitivity
D) responsibility,accountability,and compliance

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

What are some of the recommended personal security safeguards against security threats?

Correct Answer

verifed

verified

Following are some of the recommended pe...

View Answer

Explain how secure sockets layer works when a user communicates securely with a Web site.

Correct Answer

verifed

verified

Most secure communication over the Inter...

View Answer

Davian,a professional hacker,tries every possible combination of characters to crack his victim's email password.Using this technique,he can crack a six-character password of either upper- or lowercase letters in about five minutes.Which of the following techniques is used by Davian to obtain access to his victim's email?


A) denial-of-service attack
B) brute force attack
C) pretexting
D) spoofing

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Technical safeguards include encryption and usage of passwords.

A) True
B) False

Correct Answer

verifed

verified

Technical safeguards involve both software and hardware components of an information system.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ is a sophisticated,possibly long-running computer hack that is perpetrated by large,well-funded organizations like governments.


A) advanced persistent threat
B) identity threat
C) copyright theft
D) network sniffer attack

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

A ________ is a plastic card that has a microchip loaded with identifying data.


A) credit card
B) biometric passport
C) smart card
D) flashcard

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Malware definitions are patterns that exist in malware code.

A) True
B) False

Correct Answer

verifed

verified

Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.

A) True
B) False

Correct Answer

verifed

verified

A threat is a person or an organization that seeks to obtain or alter data illegally,without the owner's permission or knowledge.

A) True
B) False

Correct Answer

verifed

verified

Spoofing is a technique for intercepting computer communications.

A) True
B) False

Correct Answer

verifed

verified

________ is a broad category of software that includes viruses,worms,Trojan horses,spyware,and adware.


A) Malware
B) Payload
C) Shareware
D) Firewall

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following statements is true of the financial losses due to computer crimes?


A) All studies on the costs of computer crimes are based on surveys.
B) There are several set standards for tallying computer crime costs and financial losses.
C) Companies are legally required to calculate their financial losses due to computer crime every month.
D) Knowledge about the cost of computer crimes is restricted to large companies.

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 93

Related Exams

Show Answer