Filters
Question type

Study Flashcards

What are the steps that can be taken by organizations to safeguard people from phishing,smishing,and vishing scams?

Correct Answer

verifed

verified

Financial institutions,credit card compa...

View Answer

In the context of general security risk assessment,which of the following is true of the concept of reasonable assurance?


A) It decides whether or not to implement a particular countermeasure against attacks.
B) It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.
C) It recognizes the loss events or the risks or threats that could occur,such as a distributed denial-of-service attack or insider fraud.
D) It determines the impact of each threat occurrence.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Worms propagate without human intervention and send copies of themselves to other computers via email.

A) True
B) False

Correct Answer

verifed

verified

In the context of computer crimes,those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____.


A) hacktivists
B) white hat hackers
C) black hat hackers
D) cyberterrorists

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a technical description of a virus?


A) It is a harmful program that involves the use of Short Message Service to get personal details from victims.
B) It is the act of fraudulently using email to try to get the recipient to reveal personal data.
C) It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
D) It is the abuse of email systems to send unsolicited email to large numbers of people.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Macros can insert unwanted words,numbers,or phrases into documents or alter command functions.

A) True
B) False

Correct Answer

verifed

verified

Identify a true statement about Trojan horses.


A) They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.
B) They are used by organizations to test the security of information systems.
C) They involve the use of Short Message Service (SMS) texting for phishing.
D) They spy on users by recording keystrokes and transmitting them to a server operated by a third party.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Jack was shocked to witness the sudden drop in performance of his laptop.He also found that the screen saver constant changed and that the taskbar had disappeared.The given problems are symptoms of _____ infections.


A) rootkit
B) smishing
C) phishing
D) bootkit

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

In the context of an information technology risk assessment,assets refer to hardware components only.

A) True
B) False

Correct Answer

verifed

verified

Which of the following best describes a cybercriminal?


A) An individual who attacks a computer system or network for financial gain
B) An individual who hacks computers or Web sites in an attempt to promote a political ideology
C) An individual who attempts to destroy the infrastructure components of governments and financial institutions
D) An individual who is hired by an organization to test the security of its information systems

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Botnet computers are also called _____.


A) zombies
B) daemons
C) narutus
D) konohas

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following terms is used to describe a large group of computers controlled from one or more remote locations by hackers without the knowledge of their owners?


A) Spear-phishing
B) Botnet
C) Cyberespionage
D) Smishing

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following best describes malicious insiders?


A) They hack computers in an attempt to promote a political ideology.
B) They disrupt a company's information systems and business operations.
C) They are hired by an organization to test the security of its information systems.
D) They are hired by an organization to test the security of another organization's information systems.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a drawback of the bring your own device (BYOD) business policy?


A) It affects the productivity of the employees of a company.
B) It inhibits the privacy of the employees of a company.
C) It exposes a company's data to malware.
D) It creates the image of a company as not being flexible.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is created and issued by software engineers to remove a system vulnerability?


A) A patch
B) A key
C) A license
D) A constraint

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is true of white hat hackers?


A) They are hired by an organization to test the security of its information systems.
B) They disrupt a company's information systems and business operations.
C) They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
D) They destroy the infrastructure components of governments,financial institutions,and emergency response units.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

To reduce the potential for online credit card fraud,most e-commerce Web sites use some form of _____ technology to protect information as it comes in from the consumer.


A) encryption
B) authentication
C) authorization
D) indexing

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Identify the industry that is considered as a high-value target for cyberterrorists.


A) Automobile industry
B) Logistics industry
C) Gas industry
D) Health industry

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?


A) Camware
B) Spyware
C) Scareware
D) Ransomware

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is true of a macro virus?


A) It propagates without human intervention,often sending copies of itself to other computers by email.
B) It allows hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C) It inserts unwanted words,numbers,or phrases into documents or alters command functions in an infected document.
D) It abuses email systems to send unsolicited email to large numbers of people.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 80

Related Exams

Show Answer