Deck 4: Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/169
Play
Full screen (f)
Deck 4: Information Security
1
A(n)_________ network is any network within your organization; a(n)_________ network is any network external to your organization.
A)trusted; trusted
B)trusted; untrusted
C)untrusted; trusted
D)untrusted; untrusted
A)trusted; trusted
B)trusted; untrusted
C)untrusted; trusted
D)untrusted; untrusted
B
2
The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.
A)China
B)India
C)North Korea
D)Russia
A)China
B)India
C)North Korea
D)Russia
D
3
You leave your laptop at your desk while you go to the restroom.This is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
B
4
Careless Internet surfing is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
5
Carelessness using unmanaged devices is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
6
You never wipe the dust off your computer.This is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
A)Increasing skills necessary to be a computer hacker
B)International organized crime taking over cybercrime
C)Lack of management support
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
A)Increasing skills necessary to be a computer hacker
B)International organized crime taking over cybercrime
C)Lack of management support
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
8
You don't lock your computer when you go to the restroom.This is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
9
Computer crimes typically average _________ of dollars and cause businesses _________ of dollars in damages.
A)hundreds; millions
B)hundreds; billions
C)hundreds of thousands; millions
D)hundreds of thousands; billions
A)hundreds; millions
B)hundreds; billions
C)hundreds of thousands; millions
D)hundreds of thousands; billions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
10
Hackers used _________ to get into the Democratic National Committee computer systems.
A)denial-of-service attacks
B)spear-phishing
C)a Trojan horse
D)viruses
A)denial-of-service attacks
B)spear-phishing
C)a Trojan horse
D)viruses
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
11
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
A)Espionage
B)Malware
C)Profiling
D)Social engineering
A)Espionage
B)Malware
C)Profiling
D)Social engineering
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
12
You are a nice person,so you hold the door open for the person running in behind you.Since you needed to use your ID badge to open the door,the person running in behind you is __________; this is _________.
A)shoulder surfing; a good way to show kindness that causes no harm
B)shoulder surfing; an unintentional threat to your organization
C)tailgating; a good way to show kindness that causes no harm
D)tailgating; an unintentional threat to your organization
A)shoulder surfing; a good way to show kindness that causes no harm
B)shoulder surfing; an unintentional threat to your organization
C)tailgating; a good way to show kindness that causes no harm
D)tailgating; an unintentional threat to your organization
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
13
An information resource's _________ is the possibility that the system will be harmed by a threat.
A)exposure
B)risk
C)threat
D)vulnerability
A)exposure
B)risk
C)threat
D)vulnerability
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
14
A(n)_________ to an information resource is any danger to which a system may be exposed.
A)exposure
B)risk
C)threat
D)vulnerability
A)exposure
B)risk
C)threat
D)vulnerability
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
15
You lose the company's USB with your sales spreadsheets on it.This is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
16
It took the Democratic National Committee _________ to respond to the FBI's discovery of hacking on their system.
A)1 day
B)7 days
C)1 month
D)7 months
A)1 day
B)7 days
C)1 month
D)7 months
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
17
The _________ of an information resource is the harm,loss,or damage that can result if a threat compromises that resource.
A)exposure
B)risk
C)threat
D)vulnerability
A)exposure
B)risk
C)threat
D)vulnerability
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
18
You open an e-mail from your friend that looks a little odd,but you figure your friend would never send you anything bad.This is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
19
You get a new smartphone and throw your old one away without erasing all your data.This is _________ and is an _________ mistake.
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
A)a human error; intentional
B)a human error; unintentional
C)social engineering; intentional
D)social engineering; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
A)Additional management support
B)Decreasing skills necessary to be a computer hacker
C)International organized crime taking over cybercrime
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
A)Additional management support
B)Decreasing skills necessary to be a computer hacker
C)International organized crime taking over cybercrime
D)Smaller,faster,cheaper computers and storage devices
E)Today's interconnected,interdependent,wirelessly networked business environment
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
21
Intellectual property is NOT protected under _________ laws.
A)copyright
B)patent
C)privacy
D)trade secret
A)copyright
B)patent
C)privacy
D)trade secret
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
22
A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
A)copyright
B)patent
C)trade secret
D)trademark
A)copyright
B)patent
C)trade secret
D)trademark
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
23
_________ collects personal information about users without their consent.
A)Adware
B)Marketware
C)Spamware
D)Spyware
A)Adware
B)Marketware
C)Spamware
D)Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
24
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
A)Alien software
B)Espionage
C)Identity theft
D)Information extortion
A)Alien software
B)Espionage
C)Identity theft
D)Information extortion
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
25
_________ is a remote attack requiring user action.
A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
26
_________ is an unintentional threat.
A)Espionage
B)Identity theft
C)Social engineering
D)Software attacks
A)Espionage
B)Identity theft
C)Social engineering
D)Software attacks
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
27
Current US laws award patents for _________ years and copyright protection for _________ years.
A)20; 20
B)20; life+70
C)life+70; 20
D)life+70; life+70
A)20; 20
B)20; life+70
C)life+70; 20
D)life+70; life+70
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
28
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.
A)copyright
B)patent
C)trade secret
D)trademark
A)copyright
B)patent
C)trade secret
D)trademark
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
29
_________ occur(s)when an attacker either threatens to steal,or actually steals,information from a company and then demands payment for not carrying out a particular act.
A)Alien software
B)Espionage
C)Information extortion
D)SCADA attacks
A)Alien software
B)Espionage
C)Information extortion
D)SCADA attacks
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
30
_________ causes pop-up advertisements to appear on your screen.
A)Adware
B)Marketware
C)Spamware
D)Spyware
A)Adware
B)Marketware
C)Spamware
D)Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
31
Keystroke loggers and screen scrapers are examples of _________.
A)adware
B)marketware
C)spamware
D)spyware
A)adware
B)marketware
C)spamware
D)spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
32
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too.This is _________ and is _________.
A)piracy; legal
B)piracy; illegal
C)social engineering; legal
D)social engineering; illegal
A)piracy; legal
B)piracy; illegal
C)social engineering; legal
D)social engineering; illegal
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
33
_________ is a remote attack requiring no user action.
A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
A)DoS
B)A logic bomb
C)A Trojan horse
D)Virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
34
_________ is an attack by a programmer developing a system.
A)DoS
B)A phishing attack
C)A Trojan horse
D)Virus
A)DoS
B)A phishing attack
C)A Trojan horse
D)Virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
35
If humans are careless with laptops,this is an _________ error which could cause theft of equipment or information (an _________ error).
A)intentional; intentional
B)intentional; unintentional
C)unintentional; intentional
D)unintentional; unintentional
A)intentional; intentional
B)intentional; unintentional
C)unintentional; intentional
D)unintentional; unintentional
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
36
_________ is pestware that users your computer as a launch pad for unsolicited e-mail,usually advertising for products and services.
A)Adware
B)Marketware
C)Spamware
D)Spyware
A)Adware
B)Marketware
C)Spamware
D)Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
37
Piracy costs businesses _________ of dollars per year.
A)hundreds
B)millions
C)billions
D)trillions
A)hundreds
B)millions
C)billions
D)trillions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
38
_________ is a deliberate act that involves defacing an organization's website,potentially damaging the organization's image and causing its customers to lose faith.
A)Espionage
B)Sabotage
C)SCADA attacks
D)Software attacks
A)Espionage
B)Sabotage
C)SCADA attacks
D)Software attacks
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
39
A _________ is an intellectual work that is not based on public information.
A)copyright
B)patent
C)trade secret
D)trademark
A)copyright
B)patent
C)trade secret
D)trademark
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
40
Hackers would use a botnet to perform a _________.
A)DDoS
B)a logic bomb
C)a Trojan horse
D)virus
A)DDoS
B)a logic bomb
C)a Trojan horse
D)virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
41
_________ is a possible solution to the ransomware problem but is not recommended by the FBI.
A)Backing up data
B)Employ real-time monitoring
C)Pay the ransom
D)Provide user education and training
A)Backing up data
B)Employ real-time monitoring
C)Pay the ransom
D)Provide user education and training
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
42
If you limit your risk by implementing controls that minimize the impact of the threat,you have implemented a risk _________ strategy.
A)acceptance
B)avoidance
C)limitation
D)transference
A)acceptance
B)avoidance
C)limitation
D)transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
43
Spam costs US companies _________ of dollars per year.
A)hundreds
B)millions
C)billions
D)trillions
A)hundreds
B)millions
C)billions
D)trillions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
44
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical,real-world harm or severe disruption,often to carry out a political agenda.
A)A SCADA attack
B)Cyberterrorism
C)Espionage
D)Identity theft
A)A SCADA attack
B)Cyberterrorism
C)Espionage
D)Identity theft
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
45
Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.
A)acceptance
B)avoidance
C)limitation
D)transference
A)acceptance
B)avoidance
C)limitation
D)transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
46
Russia attacked Ukraine's _________ system.
A)internet
B)power
C)transportation
D)water
A)internet
B)power
C)transportation
D)water
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
47
The Houston Astros contacted the _________ to investigate a security breach in 2014.
A)CIA
B)FBI
C)MLB
D)NFL
A)CIA
B)FBI
C)MLB
D)NFL
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
48
If you accept the potential risk,continue operating with no controls,and absorb any damages that occur,you have adopted a risk _________ strategy.
A)acceptance
B)avoidance
C)limitation
D)transference
A)acceptance
B)avoidance
C)limitation
D)transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following was NOT used in the cyberattack on Ukraine?
A)DoS
B)Spear-phishing
C)a logic bomb
D)a SCADA attack
A)DoS
B)Spear-phishing
C)a logic bomb
D)a SCADA attack
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
50
If a hacker takes control of equipment such as power grids or nuclear power plants,this is an example of a(n)_________ attack.
A)alien software
B)espionage
C)SCADA
D)virus
A)alien software
B)espionage
C)SCADA
D)virus
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
51
Your company decides not to implement security procedures because employees refuse to comply anyway.This is an example of risk _________.
A)acceptance
B)avoidance
C)limitation
D)transference
A)acceptance
B)avoidance
C)limitation
D)transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
52
St.Louis Cardinal scouting director Christopher Correa hacked the Houston Astros' system.This was an example of _________.
A)alien software
B)cyberterrorism
C)espionage
D)identity theft
A)alien software
B)cyberterrorism
C)espionage
D)identity theft
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
53
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites.It was attacked with _________ in 2016.
A)alien software
B)a DDoS
C)espionage
D)a SCADA attack
A)alien software
B)a DDoS
C)espionage
D)a SCADA attack
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
54
Ransomware is typically disseminated through _________.
A)botnets
B)logic bombs
C)Trojan horses
D)viruses
A)botnets
B)logic bombs
C)Trojan horses
D)viruses
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
55
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.
A)50; do
B)50; do not
C)95; do
D)95; do not
A)50; do
B)50; do not
C)95; do
D)95; do not
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
56
Ukraine's protection of their SCADA systems is _________ than in the US but was vulnerable because of its use of _________.
A)better; RFID
B)better; VPN
C)worse; RFID
D)worse; VPN
A)better; RFID
B)better; VPN
C)worse; RFID
D)worse; VPN
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
57
The most current form of ransomware demands payment in the form of _________.
A)Bitcoins
B)cash
C)credit cards
D)Paypal transactions
A)Bitcoins
B)cash
C)credit cards
D)Paypal transactions
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
58
_________ is also called digital extortion.
A)Adware
B)Ransomware
C)Spamware
D)Spyware
A)Adware
B)Ransomware
C)Spamware
D)Spyware
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
59
The US government considers the Sony hack _________.
A)a SCADA attack
B)cyberterrorism
C)espionage
D)identity theft
A)a SCADA attack
B)cyberterrorism
C)espionage
D)identity theft
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
60
Dyn's hackers formed a botnet from _________.
A)corporate servers
B)devices incorporating the Internet of Things
C)individuals willing to become part-time hackers
D)programmers within the company
A)corporate servers
B)devices incorporating the Internet of Things
C)individuals willing to become part-time hackers
D)programmers within the company
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
61
In public-key encryption,the _________ key is used for locking and the _________ key is used for unlocking.
A)private; private
B)private; public
C)public; private
D)public; public
A)private; private
B)private; public
C)public; private
D)public; public
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
62
Biometrics is an example of something the user _________.
A)does
B)has
C)is
D)knows
A)does
B)has
C)is
D)knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
63
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
A)Authorization
B)Blacklisting
C)Encryption
D)Firewalling
A)Authorization
B)Blacklisting
C)Encryption
D)Firewalling
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
64
_________ is a communications control.
A)A company gate
B)Encryption
C)A firewall
D)RFID
A)A company gate
B)Encryption
C)A firewall
D)RFID
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
65
_________ controls restrict unauthorized individuals from using information resources.
A)Access
B)Communications
C)Physical
D)Useful
A)Access
B)Communications
C)Physical
D)Useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
66
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse.This is an example of a(n)_________ control.
A)access
B)communication
C)physical
D)useful
A)access
B)communication
C)physical
D)useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
67
_________ is a physical control.
A)A company gate
B)Encryption
C)A firewall
D)VPN
A)A company gate
B)Encryption
C)A firewall
D)VPN
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
68
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen.This is an example of risk _________.
A)acceptance
B)avoidance
C)limitation
D)transference
A)acceptance
B)avoidance
C)limitation
D)transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
69
_________ is a private network that uses a public network to connect users.
A)DoS
B)ERP
C)RFID
D)VPN
A)DoS
B)ERP
C)RFID
D)VPN
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
70
A(n)_________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.
A)anti-malware system
B)DMZ
C)ERP
D)firewall
A)anti-malware system
B)DMZ
C)ERP
D)firewall
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
71
A(n)_________ is a software package that attempts to identify and eliminate viruses and worms.
A)anti-malware system
B)DMZ
C)ERP
D)firewall
A)anti-malware system
B)DMZ
C)ERP
D)firewall
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
72
Your student ID is an example of something the user _________.
A)does
B)has
C)is
D)knows
A)does
B)has
C)is
D)knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
73
Typing in your password to access a system is an example of something the user _________.
A)does
B)has
C)is
D)knows
A)does
B)has
C)is
D)knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
74
_________ controls secure the movement of data across networks.
A)Access
B)Communications
C)Physical
D)Useful
A)Access
B)Communications
C)Physical
D)Useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is NOT an advantage of VPN?
A)Cost
B)Flexibility
C)Remote access
D)Security
A)Cost
B)Flexibility
C)Remote access
D)Security
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
76
If you shift your risk by using other means to compensate for the loss like purchasing insurance,you have implemented a risk _________ strategy.
A)acceptance
B)avoidance
C)limitation
D)transference
A)acceptance
B)avoidance
C)limitation
D)transference
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
77
_________ controls prevent unauthorized individuals from gaining access to a company's facilities.
A)Access
B)Communications
C)Physical
D)Useful
A)Access
B)Communications
C)Physical
D)Useful
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
78
If you have to speak into your phone to unlock it,this is an example of something the user _________.
A)does
B)has
C)is
D)knows
A)does
B)has
C)is
D)knows
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
79
A(n)_________ is located between two firewalls.
A)anti-malware system
B)DMZ
C)ERP
D)spamware detector
A)anti-malware system
B)DMZ
C)ERP
D)spamware detector
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck
80
_________ is an access control.
A)A company gate
B)Encryption
C)A firewall
D)RFID
A)A company gate
B)Encryption
C)A firewall
D)RFID
Unlock Deck
Unlock for access to all 169 flashcards in this deck.
Unlock Deck
k this deck