Filters
Question type

Study Flashcards

You recently installed a game that you got for free. After a few days, you find that your computer's log has entries of logins that were not initiated by you. The perpetrator was most likely logging in using a _______.

Correct Answer

verifed

verified

Computer _______ is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

Correct Answer

verifed

verified

You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information?

Correct Answer

verifed

verified

First, I would identify what actions or ...

View Answer

Once a _____ is installed, the attacker can gain full access to the computer.


A) ​botnet
B) zombie
C) ​worm
D) ​rootkit

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums.

A) True
B) False

Correct Answer

verifed

verified

True

The US-CERT incident reporting system is used to ____.


A) ​alert the bank about stolen credit cards
B) alert the government about missing computers
C) alert the Border Patrol about undocumented workers
D) ​alert the Department of Homeland Security about information security incidents

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_______ try, on a daily basis, to gain unauthorized access to a number of important and sensitive sites, such as the computers at the British, French, Israeli, and United States foreign intelligence agencies.

Correct Answer

verifed

verified

A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?


A) ​Distributed denial-of-service attack
B) Email attachment with harmful worm
C) Harmful virus
D) All of the above

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

D

You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______.


A) ​you will use your laptop for non-work related activity
B) ​your productivity could not be measured correctly
C) ​your non-work related use of the laptop could increase vulnerability
D) ​your activities could not be monitored

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

As the complexity of a network increases, the possibility of security breaches decreases.

A) True
B) False

Correct Answer

verifed

verified

When the data about Target's customers was stolen, it was an example of a(n) ______.

Correct Answer

verifed

verified

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack.

A) True
B) False

Correct Answer

verifed

verified

Your company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security policies?

Correct Answer

verifed

verified

I would ensure Joggers' infrastructure i...

View Answer

Most organizations do not hesitate to conceal information about a data loss event if there is a fear of bad publicity and loss of customers.

A) True
B) False

Correct Answer

verifed

verified

False

You are being consulted for recommendation on software for sales report management. There are two choices. Choice #1 is a product from an industry leader that costs more than $1,000 per license per year. The second choice is a free open-source software that is free to download and install. The free software is in a language that your programmers do not have expertise in. You may be able to convince management to hire the right programmer to install the free and open source software. Considering the importance of data security, what solution would you recommend, and why?

Correct Answer

verifed

verified

I would recommend choosing the product f...

View Answer

Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year.

A) True
B) False

Correct Answer

verifed

verified

Many organizations use _______ to provide a comprehensive display of all vital data related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts.

Correct Answer

verifed

verified

security d...

View Answer

There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?


A) activate the forensics analysis team and prepare documentation
B) ​meet with your lawyers to prepare to counter-sue the customers
C) settle with the customers, however much it may cost
D) none of these answers

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Downloading games from unknown websites can be risky. The software may be a Trojan horse.

A) True
B) False

Correct Answer

verifed

verified

Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 85

Related Exams

Show Answer