Filters
Question type

Study Flashcards

What attacks computer systems by transmitting a virus hoax,with a real virus attached?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

Correct Answer

verifed

verified

What is the most costly and intrusive form of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not one of the 10 Guiding principals of PIPEDA for organizations:


A) Accountability
B) Accuracy
C) Open access
D) Safeguards

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

Breaches in information ________________ occur when improper disclosure of personal information are made.

Correct Answer

verifed

verified

Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords __________.

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest.

Correct Answer

verifed

verified

Ethical computer use policy contains general principles to guide computer user behaviour.

A) True
B) False

Correct Answer

verifed

verified

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Hardware key logger
C) Cookie
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is identity theft?


A) Is the forging of someone's identity for the purpose of fraud
B) Is monitoring emails
C) Is hacking in a computer system with the purpose of stealing information
D) Is buying illegal information from a hacker

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Summarize the five steps to creating an information security plan.

Correct Answer

verifed

verified

Develop the information securi...

View Answer

If there is a security breech on your organizational information systems,which information security area is best suited to handle the breech?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What are the principles and standards that guide our behaviour toward other people?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

Correct Answer

verifed

verified

Discuss the reasons why privacy issues lose trust for e-businesses.

Correct Answer

verifed

verified

Loss of personal privacy is a top concer...

View Answer

Surprisingly,the biggest issue surrounding information security is not a technical issue,but a _____________ issue.

Correct Answer

verifed

verified

Showing 141 - 160 of 171

Related Exams

Show Answer