A) sniffing.
B) social engineering.
C) phishing.
D) zero-day vulnerability.
E) snooping.
Correct Answer
verified
Multiple Choice
A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Correct Answer
verified
Multiple Choice
A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM
Correct Answer
verified
Multiple Choice
A) is software that appears to be benign but does something other than expected.
B) is a virus installed as a drive-by download.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.
Correct Answer
verified
Multiple Choice
A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker
Correct Answer
verified
Multiple Choice
A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
Correct Answer
verified
Multiple Choice
A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Correct Answer
verified
Multiple Choice
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
Correct Answer
verified
Multiple Choice
A) click fraud.
B) DDOS attack.
C) spear phishing.
D) pharming.
E) identity theft.
Correct Answer
verified
Multiple Choice
A) Trojan horses that appear to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake website to ask users for confidential information.
D) using emails for threats or harassment.
E) setting up fake Wi-Fi access points that look as if they are legitimate public networks.
Correct Answer
verified
Multiple Choice
A) Zeus
B) Conficker
C) Sasser
D) ILOVEYOU
E) Cryptolocker
Correct Answer
verified
True/False
Correct Answer
verified
Showing 81 - 100 of 100
Related Exams