Filters
Question type

Study Flashcards

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.


A) Data encryption
B) Database administration
C) Data authentication
D) Database normalization

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Data safeguards protect computer hardware from external threat.

A) True
B) False

Correct Answer

verifed

verified

What is a virus? Differentiate between Trojan horses and worms.

Correct Answer

verifed

verified

A virus is a computer program that replicates itself. •Trojan horses are viruses that masquerade as useful programs or files. •A worm is a virus that self-propagates using the Internet or other computer network.

Key escrow is a(n) ________.


A) protocol used to secure communication over the internet
B) safety procedure that allows a trusted party to have a copy of the encryption key
C) device that prevents unauthorized network access
D) encryption algorithm that uses both public and private keys

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Describe six malware safeguards.

Correct Answer

verifed

verified

It is possible for users to avoid most m...

View Answer

________ are false targets for computer criminals to attack.


A) Botnets
B) Hot sites
C) Honeypots
D) Web beacons

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

________ involve the people and procedure components of information systems.


A) Firewalls
B) Technical safeguards
C) Human safeguards
D) Payloads

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a personal security safeguard?


A) sending valuable data only via email or IM
B) using single password for all the sites
C) removing high-value assets from computers
D) storing browsing history, temporary files, and cookies

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.


A) denial-of-service
B) sniffing
C) brute force
D) phishing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Define encryption and explain symmetric and asymmetric encryption for computer systems.

Correct Answer

verifed

verified

Encryption is the process of transformin...

View Answer

________ occurs when someone deceives by pretending to be someone else.


A) Hacking
B) Usurping
C) Sniffing
D) Pretexting

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Most emails and IMs are protected by encryption.

A) True
B) False

Correct Answer

verifed

verified

A new hire must seek out the employer's security policy if it is not discussed in new-employee training.

A) True
B) False

Correct Answer

verifed

verified

Companies should require vendors and partners to perform appropriate screening and security training.

A) True
B) False

Correct Answer

verifed

verified

Cookies enable an individual to access Web sites without having to sign in every time.

A) True
B) False

Correct Answer

verifed

verified

True

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.


A) Spoofing
B) Phishing
C) Sniffing
D) Pretexting

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe the magnitude of security problems in the present day.

Correct Answer

verifed

verified

The full extent of the financial and dat...

View Answer

What are spyware and adware programs?

Correct Answer

verifed

verified

•Spyware programs are installed on the user's computer without the user's knowledge or permission.Spyware resides in the background and, unknown to the user, observes the user's actions and keystrokes, monitors computer activity, and reports the user's activities to sponsoring organizations.Some malicious spyware, called key loggers, captures keystrokes to obtain user names, passwords, account numbers, and other sensitive information. •Adware is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior.Most adware is benign in that it does not perform malicious acts or steal data.It does, however, watch user activity and produce pop-up ads.Adware can also change the user's default window or modify search results and switch the user's search engine.

The best personal security safeguard is to remove browsing history, temporary files, and cookies from the computer and to set the browser to disable history and cookies.

A) True
B) False

Correct Answer

verifed

verified

Companies must establish security policies and procedures for the termination of employees.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 123

Related Exams

Show Answer