Filters
Question type

Study Flashcards

All of the following have contributed to an increase in software flaws except:


A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.

F) A) and B)
G) None of the above

Correct Answer

verifed

verified

E

________ is spyware that logs and transmits everything a user types.


A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

A) True
B) False

Correct Answer

verifed

verified

In cloud computing, accountability and responsibility for protection of sensitive data is transferred to the cloud provider.

A) True
B) False

Correct Answer

verifed

verified

Organizations can use existing network security software to secure mobile devices.

A) True
B) False

Correct Answer

verifed

verified

WPA2 is a more effective way to secure a wireless network than WEP because it:


A) includes an AUP.
B) operates on a VPN.
C) uses much longer encryption keys.
D) uses symmetric encryption methods.
E) is part of most vendors UTM products.

F) B) and E)
G) B) and D)

Correct Answer

verifed

verified

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

A) True
B) False

Correct Answer

verifed

verified

Evil twins are:


A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) email messages that mimic the email messages of a legitimate business.
C) fraudulent websites that mimic a legitimate business's website.
D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
E) bogus wireless network access points that look legitimate to users.

F) A) and D)
G) B) and C)

Correct Answer

verifed

verified

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

Correct Answer

verifed

verified

Student answers will vary. Example answe...

View Answer

Fault tolerant information systems offer 100 percent availability because they use:


A) high-capacity storage.
B) a multitier server network.
C) redundant hardware, software, and power supplies.
D) dedicated phone lines.
E) a digital certificate system.

F) A) and E)
G) A) and B)

Correct Answer

verifed

verified

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?


A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker

F) All of the above
G) B) and C)

Correct Answer

verifed

verified

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

Correct Answer

verifed

verified

Software errors pose a constant threat t...

View Answer

The Gramm-Leach-Bliley Act:


A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
E) identifies computer abuse as a crime and defines abusive activities.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

________ is malware that hijacks a user's computer and demands payment in return for giving back access.


A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

Correct Answer

verifed

verified

There are various technological essentia...

View Answer

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

A) True
B) False

Correct Answer

verifed

verified

Blockchain refers to a technology that:


A) uses a distributed ledger system of transactions.
B) uses a centralized data store in the cloud.
C) relies on the Internet to provide secure transactions.
D) uses existing banking systems to transfer funds.
E) relies on peer-to-peer networks.

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

Which of the following statements about botnets is not true?


A) Eighty percent of the world's malware is delivered by botnets.
B) Botnets are often used to perpetrate DDoS attacks.
C) Ninety percent of the world's spam is delivered by botnets.
D) Botnets are often used for click fraud.
E) It is not possible to make a smartphone part of a botnet.

F) A) and B)
G) A) and E)

Correct Answer

verifed

verified

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.


A) Software
B) Administrative
C) Data security
D) Implementation
E) Input

F) A) and B)
G) All of the above

Correct Answer

verifed

verified

B

A foreign country attempting to access government networks in order to disable a national power grid is an example of:


A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

C

Showing 1 - 20 of 100

Related Exams

Show Answer