Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

QUESTION 1 _ _ _ _ _ _ _ _ occurs through human error when employees do not follow proper procedures or when procedures have

QUESTION 1
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
Unauthorized data disclosure
Incorrect data modification
Denial of service
Loss of infrastructure
Unauthorized data encryption
1 points
QUESTION 2
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
target
vulnerability
threat
key escrow
cipher
1 points
QUESTION 3
A magnetic strip holds far more data than a microchip.
True
False
1 points
QUESTION 4
Data protection laws may be stronger in other countries than in the United States.
True
False
1 points
QUESTION 5
Which of the following statements is TRUE about biometric identification?
It involves the use of a personal identification number (PIN) for authentication.
It provides weak authentication.
It is a relatively inexpensive mode of authentication.
It often faces resistance from users for its invasive nature.
It will decline in usage in the future.
1 points
QUESTION 6
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.
Encryption
Spoofing
Phishing
Usurpation
Spear Phishing
1 points
QUESTION 7
Removing and disabling cookies presents an excellent example of the trade-off between improved security and cost.
True
False
1 points
QUESTION 8
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
stop SQL injection attacks
prevent email spoofing
prevent brute force attacks
provide physical security
prevent unauthorized encryption
1 points
QUESTION 9
All of the following are personal security safeguards except ________.
Use https
pop-ups
regularly update antivirus software
remove high-value assets from computers
send no valuable data via email
1 points
QUESTION 10
Which of the following statements is TRUE about human safeguards for employees?
Security screening in an organization is a one-time process and applies only to new employees.
User accounts should be defined to give users the least possible privilege needed to perform their jobs.
Companies should provide user accounts and passwords to employees prior to their security training.
System administrators should retain user accounts after an employee has been terminated.
There shouldn't be a separation of duty and authority.
1 points
QUESTION 11
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
public key
asymmetric encryption
key escrow
SQL injection
SHA1 hash
1 points
QUESTION 12
A(n)________ has a microchip in it to hold data.
ATM card
smart card
cookie
key escrow
dropper
1 points
QUESTION 13
What is a potential problem if there is a natural disaster?
property loss
theft
accidents
terrorist activity
hacking
1 points
QUESTION 14
Packet-filtering firewalls ________.
can filter both inbound and outbound traffic
examine the destination address but not the source address
are the most complex type of firewall
seldom examine the data or the addresses of the message
can examine the contents of VPN packets
1 points
QUESTION 15
Secure Sockets Layer is also known as ________.
Advanced Persistent Threat Layer
Transport Layer Security
Presentation Interface Layer
Network Interface Layer Security
Media Access Security
1 points
QUESTION 16
Which of the follow legal safeguards gives individuals the right to access health data created by doctors?
The Gramm-Leach-Bliley (GLB) Act
Payment Card Industry Data Security Standard (DCI DSS)
Health Insurance Portability and Accountability Act (HIPAA)
Privacy Principles
Key Escrow
1 points
QUESTION 17
John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility?
writing software program codes
using systems to perform job tasks
creating a backup of system databases
knowing whom to contact when a security breach occurs
prepare for loss of system functionality
1 points
QUESTION 18
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.
Spoofing
Phishing
Sniffing
Pretexting
Port scanning
1 points
QUESTION 19
According to the Ponemon Institute study, what is a most common type of attack?
Phishing and social engineering
Malicious code
Malware
St

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions