Deck 4: Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
Play
Full screen (f)
Deck 4: Information Security
1
A password system on a computer network is an example of which type of information security control?
A) physical
B) access
C) communication
A) physical
B) access
C) communication
B
2
The threats to information security are _____, and the greatest threat is _____.
A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software
A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software
A
3
____________ is an encryption standard used for secure transactions such as credit card processing and online banking.
A) VPN
B) TLS
C) DMZ
D) Whitelisting
A) VPN
B) TLS
C) DMZ
D) Whitelisting
B
4
The emergence of the Internet has decreased the threats to information security.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?
A) adware
B) spyware
C) spamware
D) cookies
A) adware
B) spyware
C) spamware
D) cookies
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
Which if the following is not a common risk mitigation strategy?
A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.
A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following statements is true?
A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.c) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.
A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.c) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following employees typically poses the most significant threat to information security?
A) Janitors
B) Contract labor
C) Consultants
D) IS employees
A) Janitors
B) Contract labor
C) Consultants
D) IS employees
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following would be an example of a SCADA attack?
A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts
A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
Which type of remote software attack does not require user action?
A) virus
B) worm
C) phishing attack
D) denial-of service attack
A) virus
B) worm
C) phishing attack
D) denial-of service attack
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
Low level employees pose the greatest threat to information security.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not a social engineering technique?
A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques
A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck