Correct Answer
verified
View Answer
Multiple Choice
A) It decides whether or not to implement a particular countermeasure against attacks.
B) It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.
C) It recognizes the loss events or the risks or threats that could occur,such as a distributed denial-of-service attack or insider fraud.
D) It determines the impact of each threat occurrence.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) hacktivists
B) white hat hackers
C) black hat hackers
D) cyberterrorists
Correct Answer
verified
Multiple Choice
A) It is a harmful program that involves the use of Short Message Service to get personal details from victims.
B) It is the act of fraudulently using email to try to get the recipient to reveal personal data.
C) It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
D) It is the abuse of email systems to send unsolicited email to large numbers of people.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.
B) They are used by organizations to test the security of information systems.
C) They involve the use of Short Message Service (SMS) texting for phishing.
D) They spy on users by recording keystrokes and transmitting them to a server operated by a third party.
Correct Answer
verified
Multiple Choice
A) rootkit
B) smishing
C) phishing
D) bootkit
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An individual who attacks a computer system or network for financial gain
B) An individual who hacks computers or Web sites in an attempt to promote a political ideology
C) An individual who attempts to destroy the infrastructure components of governments and financial institutions
D) An individual who is hired by an organization to test the security of its information systems
Correct Answer
verified
Multiple Choice
A) zombies
B) daemons
C) narutus
D) konohas
Correct Answer
verified
Multiple Choice
A) Spear-phishing
B) Botnet
C) Cyberespionage
D) Smishing
Correct Answer
verified
Multiple Choice
A) They hack computers in an attempt to promote a political ideology.
B) They disrupt a company's information systems and business operations.
C) They are hired by an organization to test the security of its information systems.
D) They are hired by an organization to test the security of another organization's information systems.
Correct Answer
verified
Multiple Choice
A) It affects the productivity of the employees of a company.
B) It inhibits the privacy of the employees of a company.
C) It exposes a company's data to malware.
D) It creates the image of a company as not being flexible.
Correct Answer
verified
Multiple Choice
A) A patch
B) A key
C) A license
D) A constraint
Correct Answer
verified
Multiple Choice
A) They are hired by an organization to test the security of its information systems.
B) They disrupt a company's information systems and business operations.
C) They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
D) They destroy the infrastructure components of governments,financial institutions,and emergency response units.
Correct Answer
verified
Multiple Choice
A) encryption
B) authentication
C) authorization
D) indexing
Correct Answer
verified
Multiple Choice
A) Automobile industry
B) Logistics industry
C) Gas industry
D) Health industry
Correct Answer
verified
Multiple Choice
A) Camware
B) Spyware
C) Scareware
D) Ransomware
Correct Answer
verified
Multiple Choice
A) It propagates without human intervention,often sending copies of itself to other computers by email.
B) It allows hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C) It inserts unwanted words,numbers,or phrases into documents or alters command functions in an infected document.
D) It abuses email systems to send unsolicited email to large numbers of people.
Correct Answer
verified
Showing 21 - 40 of 80
Related Exams