Filters
Question type

Study Flashcards

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

Correct Answer

verifed

verified

Software errors pose a constant threat t...

View Answer

Public key encryption uses two keys.

A) True
B) False

Correct Answer

verifed

verified

Evil twins are:


A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) e-mail messages that mimic the e-mail messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.

F) C) and E)
G) None of the above

Correct Answer

verifed

verified

Most computer viruses deliver a:


A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.

F) D) and E)
G) C) and D)

Correct Answer

verifed

verified

How does disaster recovery planning differ from business continuity planning?

Correct Answer

verifed

verified

Disaster recovery planning devises plans...

View Answer

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.


A) Software
B) Administrative
C) Data security
D) Implementation
E) Input

F) A) and D)
G) B) and D)

Correct Answer

verifed

verified

Which of the following statements about passwords is not true?


A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.

F) B) and D)
G) A) and C)

Correct Answer

verifed

verified

Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.

A) True
B) False

Correct Answer

verifed

verified

Authentication refers to verifying that a person is who he or she claims to be.

A) True
B) False

Correct Answer

verifed

verified

Application controls:


A) can be classified as input controls,processing controls,and output controls.
B) govern the design,security,and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.
D) include software controls,computer operations controls,and implementation controls.
E) monitor the use of system software and prevent unauthorized access to software and programs.

F) D) and E)
G) C) and D)

Correct Answer

verifed

verified

Which of the following focuses primarily on the technical issues of keeping systems up and running?


A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

An acceptable use policy defines the acceptable level of access to information assets for different users.

A) True
B) False

Correct Answer

verifed

verified

What is a digital certificate? How does it work?

Correct Answer

verifed

verified

Digital certificates are data files used...

View Answer

The Gramm-Leach-Bliley Act:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:


A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

Correct Answer

verifed

verified

A firm's security policies can contribut...

View Answer

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

A) True
B) False

Correct Answer

verifed

verified

The HIPAA Act of 1996:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

Which of the following statements about botnets is not true?


A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.

F) C) and D)
G) All of the above

Correct Answer

verifed

verified

Name and describe four firewall screening technologies.

Correct Answer

verifed

verified

There are a number of firewall screening...

View Answer

Showing 41 - 60 of 100

Related Exams

Show Answer