Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 1 _ _ _ _ _ _ _ _ occurs through human error when employees do not follow proper procedures or when procedures have
QUESTION
occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
Unauthorized data disclosure
Incorrect data modification
Denial of service
Loss of infrastructure
Unauthorized data encryption
points
QUESTION
A is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
target
vulnerability
threat
key escrow
cipher
points
QUESTION
A magnetic strip holds far more data than a microchip.
True
False
points
QUESTION
Data protection laws may be stronger in other countries than in the United States.
True
False
points
QUESTION
Which of the following statements is TRUE about biometric identification?
It involves the use of a personal identification number PIN for authentication.
It provides weak authentication.
It is a relatively inexpensive mode of authentication.
It often faces resistance from users for its invasive nature.
It will decline in usage in the future.
points
QUESTION
occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.
Encryption
Spoofing
Phishing
Usurpation
Spear Phishing
points
QUESTION
Removing and disabling cookies presents an excellent example of the tradeoff between improved security and cost.
True
False
points
QUESTION
The computers that run the DBMS and all devices that store database data should reside in locked, controlledaccess facilities. This is done to
stop SQL injection attacks
prevent email spoofing
prevent brute force attacks
provide physical security
prevent unauthorized encryption
points
QUESTION
All of the following are personal security safeguards except
Use https
popups
regularly update antivirus software
remove highvalue assets from computers
send no valuable data via email
points
QUESTION
Which of the following statements is TRUE about human safeguards for employees?
Security screening in an organization is a onetime process and applies only to new employees.
User accounts should be defined to give users the least possible privilege needed to perform their jobs.
Companies should provide user accounts and passwords to employees prior to their security training.
System administrators should retain user accounts after an employee has been terminated.
There shouldn't be a separation of duty and authority.
points
QUESTION
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
public key
asymmetric encryption
key escrow
SQL injection
SHA hash
points
QUESTION
An has a microchip in it to hold data.
ATM card
smart card
cookie
key escrow
dropper
points
QUESTION
What is a potential problem if there is a natural disaster?
property loss
theft
accidents
terrorist activity
hacking
points
QUESTION
Packetfiltering firewalls
can filter both inbound and outbound traffic
examine the destination address but not the source address
are the most complex type of firewall
seldom examine the data or the addresses of the message
can examine the contents of VPN packets
points
QUESTION
Secure Sockets Layer is also known as
Advanced Persistent Threat Layer
Transport Layer Security
Presentation Interface Layer
Network Interface Layer Security
Media Access Security
points
QUESTION
Which of the follow legal safeguards gives individuals the right to access health data created by doctors?
The GrammLeachBliley GLB Act
Payment Card Industry Data Security Standard DCI DSS
Health Insurance Portability and Accountability Act HIPAA
Privacy Principles
Key Escrow
points
QUESTION
John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility?
writing software program codes
using systems to perform job tasks
creating a backup of system databases
knowing whom to contact when a security breach occurs
prepare for loss of system functionality
points
QUESTION
is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.
Spoofing
Phishing
Sniffing
Pretexting
Port scanning
points
QUESTION
According to the Ponemon Institute study, what is a most common type of attack?
Phishing and social engineering
Malicious code
Malware
St
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started