Title | 25 Nov Practice Quiz |
---|---|
Author | Thomas Filippone |
Course | Business Technology Management |
Institution | Concordia University |
Pages | 8 |
File Size | 389.7 KB |
File Type | |
Total Downloads | 7 |
Total Views | 145 |
Download 25 Nov Practice Quiz PDF
Home
My courses
Started on State Completed on Time taken
Question 1
COMM-226-2192-C
Weekly Participation Quiz
25 Nov Practice Quiz
Sunday, 24 November 2019, 1:52 PM Finished Sunday, 24 November 2019, 2:13 PM 21 mins 20 secs
Marks
27.00/27.00
Grade
10.00 out of 10.00 (100%)
________ is a technique for intercepting computer communications.
Correct Mark 1.00 out of 1.00
Select one: a. Spoofing b. Sniffing c. Phishing d. Pretexting e. Hacking
Question 2
WordPerfect, a word-processing program, is an example of a ________.
Correct Mark 1.00 out of 1.00
Select one: a. data set b. software c. hardware d. procedure
Question 3 Correct Mark 1.00 out of 1.00
The best way to safeguard a web site from public users is to ________ the web site against an attack. Select one: a. update b. harden c. defend d. secure e. prepare
Question 4 Correct Mark 1.00 out of 1.00
________, which are the patterns that exist in malware code, should be downloaded and updated frequently. Select one: a. Malware definitions b. Software updates c. Malware patterns d. Service packs e. Network patches
Question 5
When an incident is reported, ________ is (are) of the essence.
Correct Mark 1.00 out of 1.00
Select one: a. a systematic approach b. actions c. preparation d. the response e. speed
Question 6
The existence of ________ user accounts is a serious security threat.
Correct Mark 1.00 out of 1.00
Select one: a. unused b. meta c. employee d. modified e. network
Question 7
PIPEDA stands for
Correct Mark 1.00 out of 1.00
Select one: a. Personal Information Protection and Effective Disclosures Act. b. Personal Information Protection and Electronic Documents Act. c. Personal Information Protection and Electronic Disclosure Actions. d. Personal Information Protection and Electronic Disclosure Act. e. Personal Information Protection and Electronic Disclosures Act.
Question 8
About ninety percent of all viruses are spread via
Correct Mark 1.00 out of 1.00
Select one: a. technology. b. network worms. c. spreadsheets. d. email. e. AOL.
Question 9 Correct Mark 1.00 out of 1.00
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards. Select one: a. Data safeguarding b. Data contents protection c. Data administration d. Data integrity e. Data rights administration
Question 10
Organizations should protect sensitive data by storing it in ________ form.
Correct Mark 1.00 out of 1.00
Select one: a. secure b. compressed c. standardized d. encrypted e. digital
Question 11
Adware is ________ than spyware.
Correct Mark 1.00 out of 1.00
Select one: a. more serious b. more benign c. less annoying d. more malicious e. harder to get rid of
Question 12 Correct Mark 1.00 out of 1.00
Passwords have weaknesses because users often choose simple passwords, which ________ systems can easily guess. Select one: a. antivirus b. malware c. intrusion d. security e. biometric
Question 13 Correct Mark 1.00 out of 1.00
In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. Select one: a. sensitivity b. controls c. riskiness d. data access e. level
Question 14 Correct Mark 1.00 out of 1.00
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. Select one: a. fire-resistant b. air-conditioned c. high-tech d. easily accessible e. central
Question 15 Correct Mark 1.00 out of 1.00
A company establishes data rights and responsibilities and educates employees on how to backup and recover the database, but the company still needs to address the ________ safeguards. Select one: a. technical b. inadvertent c. security d. human e. data
Question 16 Correct Mark 1.00 out of 1.00
When an employee notices a virus on his machine, the ________ plan should specify what to do. Select one: a. company b. security c. incident response d. technology e. antivirus
Question 17 Correct Mark 1.00 out of 1.00
If you suspect an organization has inappropriately disclosed your personal information to a 3rd party, you can lodge a complaint with Select one: a. Revenue Canada. b. Industry Canada. c. RCMP. d. Office of the Privacy Commissioner of Canada. e. the local police.
Question 18
PIPEDA stands for
Correct Mark 1.00 out of 1.00
Select one: a. Personal Information Protection and Electronic Disclosure Act. b. Personal Information Protection and Electronic Disclosure Actions. c. Personal Information Protection and Effective Disclosures Act. d. Personal Information Protection and Electronic Disclosures Act. e. Personal Information Protection and Electronic Documents Act.
Question 19
Enforcement consists of ________ interdependent factors.
Correct Mark 1.00 out of 1.00
Select one: a. 5 b. 6 c. 3 d. 4 e. 2
Question 20
Users often resist biometric identification because they feel it is
Correct Mark 1.00 out of 1.00
Select one: a. too technical. b. invasive. c. ineffective. d. hard to use. e. expensive.
Question 21
A company should clearly define the security ________ for each position.
Correct Mark 1.00 out of 1.00
Select one: a. safeguards b. accounts c. responsibilities d. levels e. backups
Question 22
________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.
Correct Mark 1.00 out of 1.00
Select one: a. Hacking b. phishing c. PIPEDA d. Identity theft e. Spoofing
Question 23
The purpose of a
________ is to protect databases and other organizational data.
Correct Mark 1.00 out of 1.00
Select one: a. operations group b. data security group c. steering committee d. data warehouse e. data safeguard
Question 24 Correct Mark 1.00 out of 1.00
According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ________ personal information. Select one: a. collecting b. using c. maintaining d. disclosing e. safeguarding
Question 25 Correct Mark 1.00 out of 1.00
Be sure and purchase your antispyware program from a ________ vendor, because some free programs in the past were actually malware programs in disguise. Select one: a. reasonable b. reputable c. illegitimate d. inexpensive e. entrepreneurial
Question 26 Correct Mark 1.00 out of 1.00
________ to (for) the physical computers that run the DBMS and all devices that store database data should be carefully controlled. Select one: a. Documentation b. Design plans c. Connections d. Access e. References
Question 27 Correct Mark 1.00 out of 1.00
Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization. Select one: a. developers b. data administrators c. help desks d. executives e. interns
/...