Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Multiple Choice

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show A  
🗑
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A) Legacy systems B) SSID standards C) Vulnerabilities D) Security policy E) Controls   show
🗑
Most computer viruses deliver a: A) worm. B) Trojan horse. C) driveby download. D) keylogger. E) payload.   show
🗑
show E  
🗑
All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A) errors. B) tapping. C) theft and fraud. D) radiation. E) sniffing.   show
🗑
All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A) hacking. B) malware. C) denial-of-service attacks. D) sniffing. E) vandalism.   show
🗑
All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A) theft of data. B) copying of data. C) alteration of data. D) radiation. E) hardware failure.   show
🗑
CryptoLocker is an example of which of the following? A) Worm B) SQL injection attack C) Sniffer D) Evil twin E) Ransomware   show
🗑
Which of the following statements about the Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.   show
🗑
show A  
🗑
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of: A) phishing. B) pharming. C) spoofing. D) evil twins. E) click fraud.   show
🗑
show E  
🗑
show B  
🗑
show C  
🗑
Which of the following statements about botnets is not true? A) Eighty percent of the world’s malware is delivered by botnets.. B) Botnets are often used to perpetrate DDoS attacks. C) Ninety percent of the world’s spam is delivered by botnets. D) Botnets are often used for click fraud. E) It is not possible to make a smartphone part of a botnet.   show
🗑
show A  
🗑
Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer E) Breaching the confidentiality of protected computerized data   show
🗑
show D  
🗑
Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? A) Computer Fraud and Abuse Act B) Economic Espionage Act C) Electronic Communications Privacy Act D) Data Security and Breach Notification Act E) National Information Infrastructure Protection Act   show
🗑
The intentional defacement or destruction of a website is called: A) spoofing. B) cybervandalism. C) cyberwarfare. D) phishing. E) pharming.   show
🗑
show E  
🗑
show A  
🗑
show B  
🗑
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering. C) phishing. D) pharming. E) snooping   show
🗑
show B  
🗑
show A  
🗑
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A) Identity theft B) Spoofing C) Social engineering D) Evil twins E) Pharming   show
🗑
show E  
🗑
A foreign country attempting to access government networks in order to disable a national power grid is an example of: A) phishing. B) denial-of-service attacks. C) cyberwarfare. D) cyberterrorism. E) evil twins.   show
🗑
show D  
🗑
show A  
🗑
show C  
🗑
Which of the following is the most common type of electronic evidence? A) Voice-mail B) Spreadsheets C) Instant messages D) E-mail E) VOIP data   show
🗑
Which of the following is a type of ambient data? A) Computer log containing recent system errors B) A file deleted from a hard disk C) A file that contains an application's user settings D) A set of raw data from an environmental sensor E) Data that has been recorded over   show
🗑
Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data.   show
🗑
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? A) $500 B) $1,000 C) $1,250 D) $1,500 E) $2,500   show
🗑
show A  
🗑
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation E) Input   show
🗑
show C  
🗑
show A  
🗑
show D  
🗑
show A  
🗑
An authentication token is a(n): A) device the size of a credit card that contains access permission data. B) type of smart card. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file.   show
🗑
show C  
🗑
A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing e-mail messages. E) create access rules for a network.   show
🗑
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies E) Firewalls   show
🗑
show E  
🗑
show E  
🗑
show B  
🗑
show A  
🗑
show A  
🗑
For 100-percent availability, online transaction processing requires: A) high-capacity storage. B) a multi-tier server network. C) fault-tolerant computer systems. D) dedicated phone lines. E) a digital certificate system.   show
🗑
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection E) unified threat management   show
🗑
show C  
🗑
Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver? A) NAT B) Packet filtering C) Deep packet inspection D) Stateful inspection E) Application proxy filtering   show
🗑
show E  
🗑
All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs. B) the growing size of software programs. C) demands for timely delivery to markets, D) the inability to fully test programs. E) the increase in malicious intruders seeking system access.   show
🗑
Which of the following defines acceptable uses of a firm’s information resources and computing equipment? A) An information systems audit policy B) A CA policy C) A MSSP D) A UTM system E) An AUP   show
🗑
Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) Security policies C) Disaster recovery planning D) An AUP E) An information systems audit   show
🗑
show A  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: endurance1997
Popular Management sets