Exam 17: Computer Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not part of information security risk analysis?

(Multiple Choice)
4.9/5
(41)

Which of the following malware programs embeds a copy of itself in another program?

(Multiple Choice)
4.8/5
(37)

A digital signature is a way to "sign" a document by appending extra data that are both unique to the sender and very difficult to forge.

(True/False)
4.7/5
(33)

A username is not sufficient for user authentication.

(True/False)
4.9/5
(33)

Malware known as a Trojan horse uses a system-oriented event to determine when it launches its attack.

(True/False)
4.9/5
(41)

Which of the following is an example of biometrics?

(Multiple Choice)
4.9/5
(30)

The companies that make antivirus software are constantly updating their databases of signatures and heuristics to detect new malware.

(True/False)
4.9/5
(34)

Which of the following malware programs might launch its attack on the next April Fool's Day?

(Multiple Choice)
4.8/5
(37)

WikiLeaks is a wiki.

(True/False)
4.9/5
(34)

Phishing is a technique that uses a fake web page to collect information such as usernames and passwords.

(True/False)
4.8/5
(33)

Password management software should be evaluated and used with care, but may provide a good solution for the active user.

(True/False)
4.8/5
(36)

Which of the following is not used for user authentication?

(Multiple Choice)
4.7/5
(37)

A transposition cipher substitutes one character with another.

(True/False)
4.8/5
(39)

Information security experts embrace the principle that no single individual should have the authority to have a significant impact on the system.

(True/False)
4.9/5
(38)

According to a 2018 report, what percentage of cyber-attacks target small businesses?

(Multiple Choice)
4.8/5
(33)

What is a logic bomb?

(Essay)
4.9/5
(43)

GPS and other location data available on cell phones are sometimes collected by corporate agencies and/or used by law enforcement to aid criminal investigations.

(True/False)
4.9/5
(31)

Which of the following ensures that data can be modified only by appropriate mechanisms?

(Multiple Choice)
5.0/5
(43)

A digital certificate is an authenticated public key kept for trusted sources in order to minimize forgeries.

(True/False)
4.7/5
(31)

Users should beware of any situation in which they are contacted and requested to provide security information.

(True/False)
4.9/5
(39)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)