Title | 7-2 Chp. 4 Reading Questions |
---|---|
Author | Jennifer Zeringue |
Course | Business Systems Analysis and Design |
Institution | Southern New Hampshire University |
Pages | 1 |
File Size | 30.5 KB |
File Type | |
Total Downloads | 80 |
Total Views | 159 |
Chapter Questions...
1.
_______ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS
2.
Which of the following statements is true? Multifactor authentication systems are more reliable and more expensive than single-factor.
3.
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security. TRUE
4.
Which of the following would be an example of a SCADA attack? Computer viruses are introduced into the electrical company’s systems resulting in a shutdown of the power plant.
5.
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? SPAMWARE
6.
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous. TRUE
7.
Which of the following is not a social engineering technique? CARELESS INTERNET SURFING
8.
Low level employees pose the greatest threat to information security. FALSE
9.
An information system’s _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks. VULNERBILITY, THREAT, EXPOSURE
10. Backup and recovery procedures are recommended only to safeguard against hardware/software failures. FALSE
11. The emergence of the Internet has decreased the threats to information security. FALSE 12. Whereas phishing attacks are ________, denial of service attacks are ________. remote attacks requiring no user action; remote attacks requiring user action
13. If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy. TRUE 14. _________ can be used to create strong passwords that are easy to remember. PASSPHRASES
15. Which if the following is not a common risk mitigation strategy? RISK ANALYSIS...