CIS Ch.4

1 December 2022
4.5 (204 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
The emergence of the Internet has decreased the threats to information security. (T/F)
answer
False
question
If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy. (T/F)
answer
True
question
Backup and recovery procedures are recommended only to safeguard against hardware/software failures. (T/F)
answer
False
question
An information system's _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks. vulnerability; threat; exposure threat; vulnerability; exposure threat; vulnerability; liability vulnerability; security; threat
answer
vulnerability; threat; exposure
question
Low level employees pose the greatest threat to information security. (T/F)
answer
False
question
Which of the following is not a social engineering technique? Tailgating Shoulder surfing Careless Internet surfing All of the choices are social engineering techniques. None of the choices are social engineering techniques.
answer
Carless Internet Surfing
question
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous. (T/F)
answer
True
question
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? cookies adware spyware spamware
answer
Spamware
question
Which of the following would be an example of a SCADA attack? Bank accounts are hacked into after Internet purchases. Social Security numbers are deleted from a company's database. Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant. Email accounts are hacked and kinky messages are sent to all of the user's contacts
answer
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
question
Whereas phishing attacks are ________, denial of service attacks are ________. remote attacks requiring user action; remote attacks requiring no user action remote attacks requiring no user action; attacks by a programmer developing a system remote attacks requiring no user action; remote attacks requiring user action distributed remote attacks requiring user action; attacks by a programmer developing a system
answer
remote attacks requiring user action; remote attacks requiring no user action
question
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security. (T/F)
answer
True
question
Which if the following is not a common risk mitigation strategy? Risk acceptance Risk limitation Risk transference Risk analysis
answer
Risk analysis
question
Which of the following statements is true? Multifactor and single-factor authentications have the same degree of reliability. Multifactor authentication systems are more reliable and more expensive than single-factor. Multifactor authentication systems are more reliable and less expensive than single-factor. Multifactor authentication systems are less reliable and less expensive than single-factor
answer
Multifactor authentication systems are more reliable and more expensive than single-factor.
question
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ VPN Whitelisting
answer
TLS
question
_________ can be used to create strong passwords that are easy to remember. Mnemonics Passphrases Birthdates Numbers
answer
Passphrases
question
ICANN coordinates unique IP addresses around the world to ensure a global Internet. (T/F)
answer
True
question
Disintermediation is a threat of substitute products from Porter's Five Forces. (T/F)
answer
True
question
In an e-credit card transaction, the clearinghouse plays the following role: Initiates the transfer of money All of these Validates and verifies the seller's payment information Transfers funds between the seller's bank and the buyer's bank
answer
Validates and verifies the seller's payment information
question
________ does NOT currently have a GPS system planned or in use. European Union Russia Australia China
answer
Australia
question
The advantages of RFID tags to Staples include all of the following EXCEPT: Precise location of each item in stores Movement history of each item through the store to moment of sale Reduced transaction costs at checkout Labor savings Accurate inventory
answer
Reduced transaction costs at checkout