A) Trojan horse
B) Phishing emails
C) SQL injection attack
D) Computer worm
E) Pharming attack
Correct Answer
verified
Multiple Choice
A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption
Correct Answer
verified
Multiple Choice
A) sniffing.
B) social engineering.
C) phishing.
D) zero-day vulnerability
E) snooping
Correct Answer
verified
Multiple Choice
A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.
Correct Answer
verified
Multiple Choice
A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) can be classified as input controls, processing controls, and output controls.
B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
D) include software controls, computer operations controls, and implementation controls.
E) Audit the systems development process at various points to ensure that the process is properly controlled and managed.
Correct Answer
verified
Multiple Choice
A) is software that appears to be benign but does something other than expected.
B) is a virus that replicates quickly.
C) is malware named for a breed of fast-moving Near-Eastern horses.
D) installs spyware on users' computers.
E) is a type of sniffer used to infiltrate corporate networks.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) application controls.
B) computer operations controls.
C) hardware controls.
D) software controls.
E) administrative controls.
Correct Answer
verified
Multiple Choice
A) The use of P2P networks can expose a corporate computer to outsiders.
B) A corporate network without access to the Internet is more secure than one that provides access.
C) VoIP is more secure than the switched voice network.
D) Instant messaging can provide hackers access to an otherwise secure network.
E) Smartphones have the same security weaknesses as other Internet devices.
Correct Answer
verified
Multiple Choice
A) $900,000.
B) $9 million.
C) $90 million.
D) $9 billion.
E) $90 billion.
Correct Answer
verified
Multiple Choice
A) Authentication cannot be established by the use of a password.
B) Password systems that are too rigorous may hinder employee productivity.
C) Passwords can be stolen through social engineering.
D) Passwords are often disregarded by employees.
E) Passwords can be sniffed when being transmitted over a network.
Correct Answer
verified
Multiple Choice
A) NAT
B) Packet filtering
C) Deep packet inspection
D) Stateful inspection
E) Application proxy filtering
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) unified threat management
Correct Answer
verified
Multiple Choice
A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM
Correct Answer
verified
Multiple Choice
A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan
Correct Answer
verified
Showing 41 - 60 of 100
Related Exams