Exam 4: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.

Free
(Multiple Choice)
5.0/5
(44)
Correct Answer:
Verified

D

If you accept the potential risk,continue operating with no controls,and absorb any damages that occur,you have adopted a risk _________ strategy.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

A

The most current form of ransomware demands payment in the form of _________.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

A

An intranet is a trusted network.

(True/False)
4.8/5
(33)

Keystroke loggers and screen scrapers are examples of _________.

(Multiple Choice)
4.8/5
(29)

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical,real-world harm or severe disruption,often to carry out a political agenda.

(Multiple Choice)
4.8/5
(33)

Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.

(Multiple Choice)
4.7/5
(40)

Once a copyright and patent is established,it applies to all countries in the world.

(True/False)
4.9/5
(39)

The Democratic National Committee had excellent security on their computer systems,but hackers were simply too good to stop with their advanced use of viruses.

(True/False)
4.8/5
(42)

Employee monitoring systems are illegal and unethical.

(True/False)
4.8/5
(33)

___ are small amounts of information that websites store on your computer,temporarily or more or less permanently.

(Short Answer)
4.9/5
(36)

You leave your laptop at your desk while you go to the restroom.This is _________ and is an _________ mistake.

(Multiple Choice)
4.8/5
(37)

People tend to violate security procedures because the procedures are inconvenient.

(True/False)
4.7/5
(36)

_________ is pestware that users your computer as a launch pad for unsolicited e-mail,usually advertising for products and services.

(Multiple Choice)
4.8/5
(31)

You need to be particularly careful of tailgating at airport terminals.

(True/False)
4.9/5
(35)

A(n)_________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

(Multiple Choice)
4.8/5
(28)

An information resource's _________ is the possibility that the system will be harmed by a threat.

(Multiple Choice)
4.9/5
(29)

Whitelisting allows nothing to run unless it is on the whitelist.

(True/False)
4.8/5
(28)

_________ controls secure the movement of data across networks.

(Multiple Choice)
4.8/5
(37)

Ransomware is typically disseminated through _________.

(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 169
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)