Filters
Question type

Study Flashcards

Which if the following is not a common risk mitigation strategy?


A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.

A) True
B) False

Correct Answer

verifed

verified

____________ is an encryption standard used for secure transactions such as credit card processing and online banking.


A) VPN
B) TLS
C) DMZ
D) Whitelisting

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?


A) adware
B) spyware
C) spamware
D) cookies

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The emergence of the Internet has decreased the threats to information security.

A) True
B) False

Correct Answer

verifed

verified

False

A password system on a computer network is an example of which type of information security control?


A) physical
B) access
C) communication

D) A) and B)
E) All of the above

Correct Answer

verifed

verified

If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.

A) True
B) False

Correct Answer

verifed

verified

Which type of remote software attack does not require user action?


A) virus
B) worm
C) phishing attack
D) denial-of service attack

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

D

Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.

A) True
B) False

Correct Answer

verifed

verified

True

Low level employees pose the greatest threat to information security.

A) True
B) False

Correct Answer

verifed

verified

Which of the following would be an example of a SCADA attack?


A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The threats to information security are _____, and the greatest threat is _____.


A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software

F) None of the above
G) B) and C)

Correct Answer

verifed

verified

Which of the following is not a social engineering technique?


A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques

F) None of the above
G) B) and E)

Correct Answer

verifed

verified

Which of the following employees typically poses the most significant threat to information security?


A) Janitors
B) Contract labor
C) Consultants
D) IS employees

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following statements is true?


A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.
C) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 15 of 15

Related Exams

Show Answer