7-2 Chp. 4 Reading Questions PDF

Title 7-2 Chp. 4 Reading Questions
Author Jennifer Zeringue
Course Business Systems Analysis and Design
Institution Southern New Hampshire University
Pages 1
File Size 30.5 KB
File Type PDF
Total Downloads 80
Total Views 159

Summary

Chapter Questions...


Description

1.

_______ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS

2.

Which of the following statements is true? Multifactor authentication systems are more reliable and more expensive than single-factor.

3.

Risk management identifies, controls, and minimizes the impact of threats to the organization's information security. TRUE

4.

Which of the following would be an example of a SCADA attack? Computer viruses are introduced into the electrical company’s systems resulting in a shutdown of the power plant.

5.

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? SPAMWARE

6.

You should regularly delete any spyware that might be residing on your computer, because it may be dangerous. TRUE

7.

Which of the following is not a social engineering technique? CARELESS INTERNET SURFING

8.

Low level employees pose the greatest threat to information security. FALSE

9.

An information system’s _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks. VULNERBILITY, THREAT, EXPOSURE

10. Backup and recovery procedures are recommended only to safeguard against hardware/software failures. FALSE

11. The emergence of the Internet has decreased the threats to information security. FALSE 12. Whereas phishing attacks are ________, denial of service attacks are ________. remote attacks requiring no user action; remote attacks requiring user action

13. If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy. TRUE 14. _________ can be used to create strong passwords that are easy to remember. PASSPHRASES

15. Which if the following is not a common risk mitigation strategy? RISK ANALYSIS...


Similar Free PDFs