Exam 25: Valuing and Storing Organizational Informationdatabases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A zombie farm is a group of computers on which a hacker has planted zombie programs.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

What is a destructive agent?

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

D

Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

(True/False)
4.8/5
(40)

Decrypt information is to decode it and is the opposite of encrypt.

(True/False)
4.8/5
(41)

What are computer viruses that wait for a specific date before executing their instructions?

(Multiple Choice)
4.8/5
(30)

Which of the following is not considered a form of biometrics?

(Multiple Choice)
4.8/5
(33)

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

(True/False)
4.7/5
(34)

Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

(True/False)
4.8/5
(41)

Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

(True/False)
4.8/5
(33)

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.

(True/False)
4.9/5
(28)

Multifactor authentication is the traditional security process, which requires a username and password.

(True/False)
4.8/5
(30)

What is pharming?

(Multiple Choice)
4.9/5
(37)

Identity theft is the forging of someone's identity for the purpose of fraud.

(True/False)
4.9/5
(31)

What is multifactor authentication?

(Multiple Choice)
4.9/5
(36)

What is two-factor authentication?

(Multiple Choice)
4.7/5
(31)

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

(Multiple Choice)
4.8/5
(29)

What is the most secure type of authentication?

(Multiple Choice)
4.8/5
(44)

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

(True/False)
4.9/5
(36)

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur?

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)