Filters
Question type

Study Flashcards

Organizations can use existing network security software to secure mobile devices.

Correct Answer

verifed

verified

Which of the following statements about botnets is not true?


A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.

Correct Answer

verifed

verified

Blockchain refers to a technology that:


A) uses a distributed ledger system of transactions.
B) uses a centralized data store in the cloud.
C) relies on the Internet to provide secure transactions.
D) uses existing banking systems to transfer funds.
E) relies on peer-to-peer networks.

Correct Answer

verifed

verified

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

Correct Answer

verifed

verified

WPA2 is a more effective way to secure a wireless network than WEP because it:


A) includes an AUP.
B) operates on a VPN.
C) uses much longer encryption keys.
D) uses symmetric encryption methods.
E) is part of most vendors UTM products.

Correct Answer

verifed

verified

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

Correct Answer

verifed

verified

There are various technological essentia...

View Answer

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

Correct Answer

verifed

verified

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.


A) Software
B) Administrative
C) Data security
D) Implementation
E) Input

Correct Answer

verifed

verified

B

Fault tolerant information systems offer 100 percent availability because they use:


A) high-capacity storage.
B) a multitier server network.
C) redundant hardware, software, and power supplies.
D) dedicated phone lines.
E) a digital certificate system.

Correct Answer

verifed

verified

A foreign country attempting to access government networks in order to disable a national power grid is an example of:


A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.

Correct Answer

verifed

verified

C

All of the following have contributed to an increase in software flaws except:


A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.

Correct Answer

verifed

verified

E

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

Correct Answer

verifed

verified

Software errors pose a constant threat t...

View Answer

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?


A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker

Correct Answer

verifed

verified

________ is malware that hijacks a user's computer and demands payment in return for giving back access.


A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin

Correct Answer

verifed

verified

The Gramm-Leach-Bliley Act:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

Correct Answer

verifed

verified

________ is spyware that logs and transmits everything a user types.


A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer

Correct Answer

verifed

verified

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

Correct Answer

verifed

verified

Student answers will vary. Example answe...

View Answer

In cloud computing, accountability and responsibility for protection of sensitive data is transferred to the cloud provider.

Correct Answer

verifed

verified

Evil twins are:


A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.

Correct Answer

verifed

verified

Showing 1 - 20 of 100

Related Exams

Show Answer