Filters
Question type

Study Flashcards

Discuss in brief the pros and cons of biometric authentication.

Correct Answer

verifed

verified

Biometric authentication uses personal p...

View Answer

Most secure communication over the Internet uses a protocol called HTTP.

A) True
B) False

Correct Answer

verifed

verified

A problem in a customer billing system that occurs due to errors made during software installation is a case of ________.


A) faulty service resulting from human error
B) distributed denial of service resulting from malicious activity
C) faulty service resulting from malicious activity
D) distributed denial of service resulting from human error

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The broadest definition of ________ includes viruses,worms,Trojan horses,spyware,and adware.


A) malware
B) metadata
C) software
D) widgets

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Explain how defining positions in an organization can safeguard against security threats.

Correct Answer

verifed

verified

Effective human safeguards begin with de...

View Answer

A user name ________ a user.


A) authenticates
B) identifies
C) conceals
D) encrypts

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

________ use(s) personal physical characteristics such as fingerprints,facial features,and retinal scans to verify users.


A) Passwords
B) Smart cards
C) Biometric authentication
D) Personal identification numbers

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

________ occur when bogus services flood a Web server.


A) Spoofing attacks
B) Hacking attacks
C) Phishing attacks
D) DOS attacks

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Pretexting occurs when someone deceives by pretending to be someone else.

A) True
B) False

Correct Answer

verifed

verified

A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.


A) hacking
B) phishing
C) pretexting
D) sniffing

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Distinguish between phishing,spoofing,and sniffing.

Correct Answer

verifed

verified

Phishing is a technique for obtaining un...

View Answer

List some important malware safeguards.

Correct Answer

verifed

verified

It is possible to avoid most malware usi...

View Answer

What is the difference between adware and spyware?

Correct Answer

verifed

verified

Spyware programs are installed on the us...

View Answer

Which of the following are malware masquerading as useful programs?


A) macro viruses
B) Trojan horses
C) worms
D) payloads

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is the similarity between adware and spyware?


A) Both masquerade as useful programs.
B) Both are specifically programmed to spread.
C) Both are installed without the user's permission.
D) Both are used to steal data.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Technical safeguards include passwords and encryption.

A) True
B) False

Correct Answer

verifed

verified

Activity log analysis is an important ________ function.


A) account administration
B) security monitoring
C) backup
D) data administration

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Every organization must have an incident-response plan that allows for decentralized reporting of all security incidents.

A) True
B) False

Correct Answer

verifed

verified

________ is an example of a data safeguard against security threats.


A) Application design
B) Backup and recovery
C) Accountability
D) Procedure design

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is an example of a security threat resulting from malicious human activity?


A) an employee who misunderstands operating procedures
B) an employee who accidentally deletes customer records
C) an employee who inadvertently installs an old database on top of the current one
D) an employee who intentionally destroys data or other system components

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 80

Related Exams

Show Answer