Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an example of a weak password?

(Multiple Choice)
4.7/5
(46)

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

(True/False)
4.8/5
(42)

The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.

(True/False)
4.7/5
(35)

Contrast the following types of attacks created by programmers: Trojan horse, back door, and logic bomb

(Not Answered)
This question doesn't have any answer yet
Ask our community

In _____, the organization takes concrete actions against risks.

(Multiple Choice)
4.9/5
(34)

Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing.

(Not Answered)
This question doesn't have any answer yet
Ask our community

A VPN is a network within the organization.

(True/False)
5.0/5
(37)

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?

(Multiple Choice)
4.8/5
(38)

The most overlooked people in information security are:

(Multiple Choice)
4.9/5
(38)

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

(Multiple Choice)
4.7/5
(31)

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?

(Multiple Choice)
4.9/5
(42)
Showing 81 - 91 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)