Filters
Question type

Study Flashcards

When a hacker discovers a security hole in software that is unknown to the software vendor,it is an example of:


A) sniffing.
B) social engineering.
C) phishing.
D) zero-day vulnerability.
E) snooping.

F) A) and B)
G) B) and D)

Correct Answer

verifed

verified

A statement ranking information risks and identifying security goals would be included in which of the following?


A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan

F) A) and B)
G) B) and E)

Correct Answer

verifed

verified

Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.


A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

A Trojan horse:


A) is software that appears to be benign but does something other than expected.
B) is a virus installed as a drive-by download.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?


A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker

F) B) and E)
G) A) and D)

Correct Answer

verifed

verified

Which of the following focuses primarily on the technical issues of keeping systems up and running?


A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?


A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan

F) B) and C)
G) D) and E)

Correct Answer

verifed

verified

Which of the following refers to all of the methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its accounting records,and operational adherence to management standards?


A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls

F) D) and E)
G) B) and E)

Correct Answer

verifed

verified

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:


A) click fraud.
B) DDOS attack.
C) spear phishing.
D) pharming.
E) identity theft.

F) A) and E)
G) B) and D)

Correct Answer

verifed

verified

Evil twins are:


A) Trojan horses that appear to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.

F) None of the above
G) C) and D)

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

A) True
B) False

Correct Answer

verifed

verified

What are the security challenges faced by wireless networks?

Correct Answer

verifed

verified

Wireless networks are vulnerable because...

View Answer

How does disaster recovery planning differ from business continuity planning?

Correct Answer

verifed

verified

Disaster recovery planning devises plans...

View Answer

DoS attacks flood a network server with thousands of requests for service.

A) True
B) False

Correct Answer

verifed

verified

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

A) True
B) False

Correct Answer

verifed

verified

What is the role of an information systems audit?

Correct Answer

verifed

verified

An information systems audit examines th...

View Answer

The HIPAA Act of 1996:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

F) A) and B)
G) B) and C)

Correct Answer

verifed

verified

Pharming involves:


A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake website to ask users for confidential information.
D) using emails for threats or harassment.
E) setting up fake Wi-Fi access points that look as if they are legitimate public networks.

F) A) and B)
G) D) and E)

Correct Answer

verifed

verified

Which of the following is an example of a keylogger?


A) Zeus
B) Conficker
C) Sasser
D) ILOVEYOU
E) Cryptolocker

F) C) and E)
G) All of the above

Correct Answer

verifed

verified

A computer virus replicates more quickly than a computer worm.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer