A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.
Correct Answer
verified
Multiple Choice
A) adware
B) spyware
C) spamware
D) cookies
Correct Answer
verified
Multiple Choice
A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques
Correct Answer
verified
Multiple Choice
A) VPN
B) TLS
C) DMZ
D) Whitelisting
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) physical
B) access
C) communication
Correct Answer
verified
Multiple Choice
A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software
Correct Answer
verified
Multiple Choice
A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts
Correct Answer
verified
Multiple Choice
A) virus
B) worm
C) phishing attack
D) denial-of service attack
Correct Answer
verified
Multiple Choice
A) Janitors
B) Contract labor
C) Consultants
D) IS employees
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.
C) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 15 of 15
Related Exams