25 Nov Practice Quiz PDF

Title 25 Nov Practice Quiz
Author Thomas Filippone
Course Business Technology Management
Institution Concordia University
Pages 8
File Size 389.7 KB
File Type PDF
Total Downloads 7
Total Views 145

Summary

Download 25 Nov Practice Quiz PDF


Description

Home

My courses

Started on State Completed on Time taken

Question 1

COMM-226-2192-C

Weekly Participation Quiz

25 Nov Practice Quiz

Sunday, 24 November 2019, 1:52 PM Finished Sunday, 24 November 2019, 2:13 PM 21 mins 20 secs

Marks

27.00/27.00

Grade

10.00 out of 10.00 (100%)

________ is a technique for intercepting computer communications.

Correct Mark 1.00 out of 1.00

Select one: a. Spoofing b. Sniffing c. Phishing d. Pretexting e. Hacking

Question 2

WordPerfect, a word-processing program, is an example of a ________.

Correct Mark 1.00 out of 1.00

Select one: a. data set b. software c. hardware d. procedure

Question 3 Correct Mark 1.00 out of 1.00

The best way to safeguard a web site from public users is to ________ the web site against an attack. Select one: a. update b. harden c. defend d. secure e. prepare

Question 4 Correct Mark 1.00 out of 1.00

________, which are the patterns that exist in malware code, should be downloaded and updated frequently. Select one: a. Malware definitions b. Software updates c. Malware patterns d. Service packs e. Network patches

Question 5

When an incident is reported, ________ is (are) of the essence.

Correct Mark 1.00 out of 1.00

Select one: a. a systematic approach b. actions c. preparation d. the response e. speed

Question 6

The existence of ________ user accounts is a serious security threat.

Correct Mark 1.00 out of 1.00

Select one: a. unused b. meta c. employee d. modified e. network

Question 7

PIPEDA stands for

Correct Mark 1.00 out of 1.00

Select one: a. Personal Information Protection and Effective Disclosures Act. b. Personal Information Protection and Electronic Documents Act. c. Personal Information Protection and Electronic Disclosure Actions. d. Personal Information Protection and Electronic Disclosure Act. e. Personal Information Protection and Electronic Disclosures Act.

Question 8

About ninety percent of all viruses are spread via

Correct Mark 1.00 out of 1.00

Select one: a. technology. b. network worms. c. spreadsheets. d. email. e. AOL.

Question 9 Correct Mark 1.00 out of 1.00

________ is an organization-wide function that is in charge of developing data policies and enforcing data standards. Select one: a. Data safeguarding b. Data contents protection c. Data administration d. Data integrity e. Data rights administration

Question 10

Organizations should protect sensitive data by storing it in ________ form.

Correct Mark 1.00 out of 1.00

Select one: a. secure b. compressed c. standardized d. encrypted e. digital

Question 11

Adware is ________ than spyware.

Correct Mark 1.00 out of 1.00

Select one: a. more serious b. more benign c. less annoying d. more malicious e. harder to get rid of

Question 12 Correct Mark 1.00 out of 1.00

Passwords have weaknesses because users often choose simple passwords, which ________ systems can easily guess. Select one: a. antivirus b. malware c. intrusion d. security e. biometric

Question 13 Correct Mark 1.00 out of 1.00

In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. Select one: a. sensitivity b. controls c. riskiness d. data access e. level

Question 14 Correct Mark 1.00 out of 1.00

Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. Select one: a. fire-resistant b. air-conditioned c. high-tech d. easily accessible e. central

Question 15 Correct Mark 1.00 out of 1.00

A company establishes data rights and responsibilities and educates employees on how to backup and recover the database, but the company still needs to address the ________ safeguards. Select one: a. technical b. inadvertent c. security d. human e. data

Question 16 Correct Mark 1.00 out of 1.00

When an employee notices a virus on his machine, the ________ plan should specify what to do. Select one: a. company b. security c. incident response d. technology e. antivirus

Question 17 Correct Mark 1.00 out of 1.00

If you suspect an organization has inappropriately disclosed your personal information to a 3rd party, you can lodge a complaint with Select one: a. Revenue Canada. b. Industry Canada. c. RCMP. d. Office of the Privacy Commissioner of Canada. e. the local police.

Question 18

PIPEDA stands for

Correct Mark 1.00 out of 1.00

Select one: a. Personal Information Protection and Electronic Disclosure Act. b. Personal Information Protection and Electronic Disclosure Actions. c. Personal Information Protection and Effective Disclosures Act. d. Personal Information Protection and Electronic Disclosures Act. e. Personal Information Protection and Electronic Documents Act.

Question 19

Enforcement consists of ________ interdependent factors.

Correct Mark 1.00 out of 1.00

Select one: a. 5 b. 6 c. 3 d. 4 e. 2

Question 20

Users often resist biometric identification because they feel it is

Correct Mark 1.00 out of 1.00

Select one: a. too technical. b. invasive. c. ineffective. d. hard to use. e. expensive.

Question 21

A company should clearly define the security ________ for each position.

Correct Mark 1.00 out of 1.00

Select one: a. safeguards b. accounts c. responsibilities d. levels e. backups

Question 22

________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.

Correct Mark 1.00 out of 1.00

Select one: a. Hacking b. phishing c. PIPEDA d. Identity theft e. Spoofing

Question 23

The purpose of a

________ is to protect databases and other organizational data.

Correct Mark 1.00 out of 1.00

Select one: a. operations group b. data security group c. steering committee d. data warehouse e. data safeguard

Question 24 Correct Mark 1.00 out of 1.00

According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ________ personal information. Select one: a. collecting b. using c. maintaining d. disclosing e. safeguarding

Question 25 Correct Mark 1.00 out of 1.00

Be sure and purchase your antispyware program from a ________ vendor, because some free programs in the past were actually malware programs in disguise. Select one: a. reasonable b. reputable c. illegitimate d. inexpensive e. entrepreneurial

Question 26 Correct Mark 1.00 out of 1.00

________ to (for) the physical computers that run the DBMS and all devices that store database data should be carefully controlled. Select one: a. Documentation b. Design plans c. Connections d. Access e. References

Question 27 Correct Mark 1.00 out of 1.00

Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization. Select one: a. developers b. data administrators c. help desks d. executives e. interns

/...


Similar Free PDFs