Filters
Question type

Study Flashcards

Which if the following is not a common risk mitigation strategy?


A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.

Correct Answer

verifed

verified

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?


A) adware
B) spyware
C) spamware
D) cookies

Correct Answer

verifed

verified

Which of the following is not a social engineering technique?


A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques

Correct Answer

verifed

verified

____________ is an encryption standard used for secure transactions such as credit card processing and online banking.


A) VPN
B) TLS
C) DMZ
D) Whitelisting

Correct Answer

verifed

verified

The emergence of the Internet has decreased the threats to information security.

Correct Answer

verifed

verified

False

Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.

Correct Answer

verifed

verified

True

A password system on a computer network is an example of which type of information security control?


A) physical
B) access
C) communication

Correct Answer

verifed

verified

The threats to information security are _____, and the greatest threat is _____.


A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software

Correct Answer

verifed

verified

Which of the following would be an example of a SCADA attack?


A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts

Correct Answer

verifed

verified

Which type of remote software attack does not require user action?


A) virus
B) worm
C) phishing attack
D) denial-of service attack

Correct Answer

verifed

verified

D

Which of the following employees typically poses the most significant threat to information security?


A) Janitors
B) Contract labor
C) Consultants
D) IS employees

Correct Answer

verifed

verified

Low level employees pose the greatest threat to information security.

Correct Answer

verifed

verified

You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.

Correct Answer

verifed

verified

Which of the following statements is true?


A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.
C) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.

Correct Answer

verifed

verified

If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.

Correct Answer

verifed

verified

Showing 1 - 15 of 15

Related Exams

Show Answer