Front | Back |
An
example of malicious human activity could include an employee who, in the
course of backing up a database, inadvertently installs an old database on top
of the current one.A. TrueB. False
|
A.
True
B.
False
Answer: FALSE
|
Drive-by
spoofers take computers with wireless connections through an area and search
for unprotected wireless networks. A. TrueB. False
|
A.
True
B.
False
Answer: FALSE
|
The
IT department should set the security policy for an organization. A. TrueB. False
|
A.
True
B.
False
Answer: FALSE
|
HIPAA
sets limits on who can receive your health information.A. TrueB. False
|
A.
True
B.
False
Answer: TRUE
|
Encryption
is an example of a technical safeguard. A. TrueB. False
|
A.
True
B.
False
Answer: TRUE
|
The
________ pretends to be a legitimate company and sends an email requesting
confidential data, such as account numbers, Social Security numbers, account
passwords, and so forth.A. hawkerB. phisherC. spooferD. sniffer
|
Answer: B |
Which
of the following usually happens in a malicious denial-of-service attack?
A.
A hacker monitors and intercepts
wireless traffic at will.
B.
A hacker floods a Web server with
millions of bogus service requests.
C.
A hacker uses unauthorized programs to
invade a computer system and replace legitimate programs.
D.
A phisher pretends to be a legitimate
company and sends an email requesting confidential data.
|
Answer: B
|
Which
of the following is a critical security function of senior-management
involvement? safeguarding computer hardware and softwareB. planning response to security incidentsC. establishing the security policyD. managing the security program on a real-time basis
|
Answer: C |
Which
of the following is an example of a technical safeguard?A. backup and recoveryB. encryptionC. procedure designD. compliance
|
Answer: B |
A
security policy covering personal use of computers at work would be an example
of a ________.
A.
data policy
B.
issue-specific policy
C.
system-specific policy
D.
personnel policy
|
Answer: B
|
Which
of the following is used for biometric authentication?
A.
smart cards
B.
facial features
C.
passwords
D.
chromosome data
|
Answer: B
|
________
encryption uses the same key for both parties.
A.
Symmetric
B.
Asymmetric
C.
SSL
D.
TLS
|
Answer: A
|
You
are doing an online fund transfer through the Web site of a reputed bank. Which
of the following displayed in your browser's address bar will let you know that
the bank is using the SSL protocol?
A.
http://
B.
www3
C.
https://
D.
.com
|
Answer: C
|