The emergence of the Internet has decreased the threats to information security. (T/F)
answer
False
question
If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy. (T/F)
answer
True
question
Backup and recovery procedures are recommended only to safeguard against hardware/software failures. (T/F)
answer
False
question
An information system's _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks.
vulnerability; threat; exposure
threat; vulnerability; exposure
threat; vulnerability; liability
vulnerability; security; threat
answer
vulnerability; threat; exposure
question
Low level employees pose the greatest threat to information security. (T/F)
answer
False
question
Which of the following is not a social engineering technique?
Tailgating
Shoulder surfing
Careless Internet surfing
All of the choices are social engineering techniques.
None of the choices are social engineering techniques.
answer
Carless Internet Surfing
question
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.
(T/F)
answer
True
question
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?
cookies
adware
spyware
spamware
answer
Spamware
question
Which of the following would be an example of a SCADA attack?
Bank accounts are hacked into after Internet purchases.
Social Security numbers are deleted from a company's database.
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
Email accounts are hacked and kinky messages are sent to all of the user's contacts
answer
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
question
Whereas phishing attacks are ________, denial of service attacks are ________.
remote attacks requiring user action; remote attacks requiring no user action
remote attacks requiring no user action; attacks by a programmer developing a system
remote attacks requiring no user action; remote attacks requiring user action
distributed remote attacks requiring user action; attacks by a programmer developing a system
answer
remote attacks requiring user action; remote attacks requiring no user action
question
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security. (T/F)
answer
True
question
Which if the following is not a common risk mitigation strategy?
Risk acceptance
Risk limitation
Risk transference
Risk analysis
answer
Risk analysis
question
Which of the following statements is true?
Multifactor and single-factor authentications have the same degree of reliability.
Multifactor authentication systems are more reliable and more expensive than single-factor.
Multifactor authentication systems are more reliable and less expensive than single-factor.
Multifactor authentication systems are less reliable and less expensive than single-factor
answer
Multifactor authentication systems are more reliable and more expensive than single-factor.
question
________ is an encryption standard used for secure transactions such as credit card processing and online banking.
TLS
DMZ
VPN
Whitelisting
answer
TLS
question
_________ can be used to create strong passwords that are easy to remember.
Mnemonics
Passphrases
Birthdates
Numbers
answer
Passphrases
question
ICANN coordinates unique IP addresses around the world to ensure a global Internet.
(T/F)
answer
True
question
Disintermediation is a threat of substitute products from Porter's Five Forces. (T/F)
answer
True
question
In an e-credit card transaction, the clearinghouse plays the following role:
Initiates the transfer of money
All of these
Validates and verifies the seller's payment information
Transfers funds between the seller's bank and the buyer's bank
answer
Validates and verifies the seller's payment information
question
________ does NOT currently have a GPS system planned or in use.
European Union
Russia
Australia
China
answer
Australia
question
The advantages of RFID tags to Staples include all of the following EXCEPT:
Precise location of each item in stores
Movement history of each item through the store to moment of sale
Reduced transaction costs at checkout
Labor savings
Accurate inventory
answer
Reduced transaction costs at checkout
Haven't found what you need?
Search for quizzes and test answers now
Quizzes.studymoose.com uses cookies. By continuing you agree to our cookie policy