Deck 4: Information Security

ملء الشاشة (f)
exit full mode
سؤال
A password system on a computer network is an example of which type of information security control?

A) physical
B) access
C) communication
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The threats to information security are _____, and the greatest threat is _____.

A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software
سؤال
____________ is an encryption standard used for secure transactions such as credit card processing and online banking.

A) VPN
B) TLS
C) DMZ
D) Whitelisting
سؤال
The emergence of the Internet has decreased the threats to information security.
سؤال
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.
سؤال
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?

A) adware
B) spyware
C) spamware
D) cookies
سؤال
Which if the following is not a common risk mitigation strategy?

A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.
سؤال
If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.
سؤال
Which of the following statements is true?

A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.c) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.
سؤال
Which of the following employees typically poses the most significant threat to information security?

A) Janitors
B) Contract labor
C) Consultants
D) IS employees
سؤال
Which of the following would be an example of a SCADA attack?

A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts
سؤال
Which type of remote software attack does not require user action?

A) virus
B) worm
C) phishing attack
D) denial-of service attack
سؤال
Low level employees pose the greatest threat to information security.
سؤال
Which of the following is not a social engineering technique?

A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques
سؤال
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/15
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Information Security
1
A password system on a computer network is an example of which type of information security control?

A) physical
B) access
C) communication
B
2
The threats to information security are _____, and the greatest threat is _____.

A) increasing, human
B) decreasing, human
C) increasing, technological
D) decreasing, technological
E) staying about the same, software
A
3
____________ is an encryption standard used for secure transactions such as credit card processing and online banking.

A) VPN
B) TLS
C) DMZ
D) Whitelisting
B
4
The emergence of the Internet has decreased the threats to information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
5
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?

A) adware
B) spyware
C) spamware
D) cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which if the following is not a common risk mitigation strategy?

A) Risk analysis.
B) Risk limitation.
C) Risk acceptance.
D) Risk trasnference.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
8
If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following statements is true?

A) Multifactor authentication systems are more reliable and less expensive than single-factor.
B) Multifactor authentication systems are more reliable and more expensive than single-factor.c) Multifactor authentication systems are less reliable and less expensive than single-factor
D) Multifactor and single-factor authentications have the same degree of reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following employees typically poses the most significant threat to information security?

A) Janitors
B) Contract labor
C) Consultants
D) IS employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following would be an example of a SCADA attack?

A) Bank accounts are hacked into after Internet purchases
B) Social Security numbers are deleted from a company's database.
C) Computer viruses are introduced into the electrical company's systems resulting ain a shutdown of the power plant.
D) Email accounts are hacked and kinky messages are sent to all fo the user's contacts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which type of remote software attack does not require user action?

A) virus
B) worm
C) phishing attack
D) denial-of service attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
13
Low level employees pose the greatest threat to information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is not a social engineering technique?

A) Tailgating
B) Shoulder surfing
C) Careless internet surfing
D) All of the choices are social engineering techniques.
E) None of the choices are social engineering techniques
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
15
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.