Filters
Question type

Study Flashcards

Specific security challenges that threaten the communications lines in a client/server environment include


A) tapping;sniffing;message alteration;radiation.
B) hacking;vandalism;denial of service attacks.
C) theft,copying,alteration of data;hardware or software failure.
D) unauthorized access;errors;spyware.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

The most common type of electronic evidence is


A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

A) True
B) False

Correct Answer

verifed

verified

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.


A) defragmented
B) ambient
C) forensic
D) recovery

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Businesses must protect only their own information assets but not those of customers,employees,and business partners.

A) True
B) False

Correct Answer

verifed

verified

Robert knows that he got an independent program off of his network on his computer.It deleted all of his spreadsheet files on his hard drive.Robert feels that this problem may have resulted from him opening up an attachment file on his e-mail.Robert is the victim of ________.


A) spoofing
B) keyloggers
C) a Trojan horse
D) worms

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

One increasingly popular tactic is a form of spoofing called phishing.

A) True
B) False

Correct Answer

verifed

verified

A hacker is an individual who intends to gain unauthorized access to a computer system.

A) True
B) False

Correct Answer

verifed

verified

How do hackers create a botnet?


A) by infecting Web search bots with malware
B) by using Web search bots to infect other computers
C) by causing other people's computers to become "zombie" PCs following a master computer
D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

SSL is a protocol used to establish a secure connection between two computers.

A) True
B) False

Correct Answer

verifed

verified

Businesses must protect not only their own information assets but also those of ________.


A) customers.employees,and competitors
B) competitors.employees,and business partners
C) customers.competitors and business partners
D) customers.employees,and business partners

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Many Wi-Fi networks can be penetrated easily by intruders using ________ programs to obtain an address to access the resources of a network without authorization.


A) phishing
B) sniffer
C) pharming
D) encryption

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

A) True
B) False

Correct Answer

verifed

verified

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

A) True
B) False

Correct Answer

verifed

verified

On the whole,________ controls apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.

Correct Answer

verifed

verified

The term ________ is typically used to denote a hacker with criminal intent.

Correct Answer

verifed

verified

Phishing involves


A) setting up bogus Wi-Fi hot spots.
B) setting up fake Web sites to ask users for confidential information.
C) pretending to be a legitimate business's representative in order to garner information about a security system.
D) using e-mails for threats or harassment.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Computer forensics is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

A) True
B) False

Correct Answer

verifed

verified

Computer crime is defined as "any criminal activity involving the copy of,use of,removal of,interference with,access to,manipulation of computer systems,and/or their related functions,data or programs."

A) True
B) False

Correct Answer

verifed

verified

Output controls check data for accuracy and completeness when they enter the system.

A) True
B) False

Correct Answer

verifed

verified

Showing 121 - 140 of 202

Related Exams

Show Answer