Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) e-mail messages that mimic the e-mail messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.
Correct Answer
verified
Multiple Choice
A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Software
B) Administrative
C) Data security
D) Implementation
E) Input
Correct Answer
verified
Multiple Choice
A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) can be classified as input controls,processing controls,and output controls.
B) govern the design,security,and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.
D) include software controls,computer operations controls,and implementation controls.
E) monitor the use of system software and prevent unauthorized access to software and programs.
Correct Answer
verified
Multiple Choice
A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Showing 41 - 60 of 100
Related Exams