Correct Answer
verified
Multiple Choice
A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.
Correct Answer
verified
Multiple Choice
A) uses a distributed ledger system of transactions.
B) uses a centralized data store in the cloud.
C) relies on the Internet to provide secure transactions.
D) uses existing banking systems to transfer funds.
E) relies on peer-to-peer networks.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) includes an AUP.
B) operates on a VPN.
C) uses much longer encryption keys.
D) uses symmetric encryption methods.
E) is part of most vendors UTM products.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Software
B) Administrative
C) Data security
D) Implementation
E) Input
Correct Answer
verified
Multiple Choice
A) high-capacity storage.
B) a multitier server network.
C) redundant hardware, software, and power supplies.
D) dedicated phone lines.
E) a digital certificate system.
Correct Answer
verified
Multiple Choice
A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
Correct Answer
verified
Multiple Choice
A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker
Correct Answer
verified
Multiple Choice
A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin
Correct Answer
verified
Multiple Choice
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.
Correct Answer
verified
Multiple Choice
A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.
Correct Answer
verified
Showing 1 - 20 of 100
Related Exams