Exam 8: Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Over time, attackers have had to increase their skills to be able to attack systems or create viruses.

(True/False)
4.7/5
(40)

The deep web is a part of the internet that includes unindexed websites offering both legal and illegal items, such as passports, citizenship, and even murders for hire.

(True/False)
4.9/5
(46)

You can purchase stolen credit cards on the "deep web" using a browser called "Tor."

(True/False)
4.9/5
(34)

All of the following are classic signs of a phishing message except:

(Multiple Choice)
4.9/5
(36)

According to the late L. Dain Gary, "You cannot make a computer secure."

(True/False)
4.7/5
(36)

Included in the five critical elements that are used to raise security in a firm are all of the following except:

(Multiple Choice)
4.9/5
(32)

Of the seven security policies noted in Chapter 7 (Figure 7.5), name at least three. Matching

(Short Answer)
4.9/5
(37)

If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:

(Multiple Choice)
4.8/5
(31)

Thanks to tightened security in operating systems, it is more difficult than ever before for hackers to break into systems, compared to the early 1990s, when people were much less often protected, less aware of risks, and more easily fooled.

(True/False)
4.8/5
(33)

The most common password of all in 2014 is:

(Multiple Choice)
4.9/5
(41)

What is a challenge question?

(Short Answer)
4.9/5
(43)

What is Poulson's Law?

(Short Answer)
4.8/5
(45)

This is a situation in which the thief counterfeits a different person's address

(Short Answer)
4.7/5
(36)

Examples of multi-factor authentication are:

(Multiple Choice)
4.8/5
(44)

If you receive an email from your son, and the body of the email tells you to open an attachment because it is funny, the risk is pretty close to zero because it came from your son.

(True/False)
4.9/5
(43)

Who is responsible for decisions about security strategy?

(Multiple Choice)
4.9/5
(43)

What security and controls should a company use to protect its computer infrastructure? Why do managers need to be involved in the decisions about security and control measures?

(Essay)
4.8/5
(33)

Match the security tool to its security category. Match the security tool to its security category.

(Not Answered)
This question doesn't have any answer yet
Ask our community

The Deep Web is reputed to be 400 times larger than the public web.

(True/False)
4.9/5
(36)

It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts

(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)