Filters
Question type

Study Flashcards

Symmetric encryption uses one key.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not an example of a computer used as a target of crime?


A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data

F) A) and C)
G) B) and C)

Correct Answer

verifed

verified

Phishing is a form of spoofing.

A) True
B) False

Correct Answer

verifed

verified

As described in the chapter case,losing smartphones is a common cause of data breaches.

A) True
B) False

Correct Answer

verifed

verified

Smartphones typically feature state-of-the-art encryption and security features,making them highly secure tools for businesses.

A) True
B) False

Correct Answer

verifed

verified

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:


A) phishing
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.

F) A) and B)
G) C) and D)

Correct Answer

verifed

verified

In cloud computing,accountability and responsibility for protection of sensitive data resides with the company owning the data.

A) True
B) False

Correct Answer

verifed

verified

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

Correct Answer

verifed

verified

A firm's security policies can contribut...

View Answer

In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.


A) high availability computing
B) deep packet inspection
C) application proxy filtering
D) stateful inspection
E) unified threat management

F) A) and C)
G) A) and B)

Correct Answer

verifed

verified

In public key encryption,the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

A) True
B) False

Correct Answer

verifed

verified

Most computer viruses deliver a:


A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.

F) A) and C)
G) A) and E)

Correct Answer

verifed

verified

Two-factor authentication utilizes a(n) :


A) unique password.
B) encrypted connection.
C) a multistep process of authentication.
D) a firewall.
E) a digital certificate.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?


A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption

F) D) and E)
G) A) and C)

Correct Answer

verifed

verified

Fault tolerant information systems offer 100 percent availability because they use:


A) high-capacity storage.
B) a multitier server network.
C) redundant hardware,software,and power supplies.
D) dedicated phone lines.
E) a digital certificate system.

F) A) and C)
G) B) and D)

Correct Answer

verifed

verified

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up.This is an example of:


A) phishing.
B) pharming.
C) spoofing.
D) evil twins.
E) click fraud.

F) C) and E)
G) A) and B)

Correct Answer

verifed

verified

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:


A) theft of data.
B) copying of data.
C) alteration of data.
D) radiation.
E) hardware failure.

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

According to the 2018 Identity Fraud Study by Javelin Strategy & Research,how much did consumers lose to identity fraud in 2017?


A) $1.7 million
B) $17 million
C) $170 million
D) $1.7 billion
E) $17 billion

F) C) and D)
G) B) and C)

Correct Answer

verifed

verified

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

A) True
B) False

Correct Answer

verifed

verified

According to Ponemon Institute's 2017 Annual Cost of Cyber Crime Study,the average annualized cost of cybercrime for benchmarked companies in seven different countries was approximately:


A) $117,000.
B) $11.7 million.
C) $117 million.
D) $11.7 billion.
E) $117 billion.

F) C) and E)
G) B) and D)

Correct Answer

verifed

verified

Define computer forensics and describe the types of problems it is designed to address.

Correct Answer

verifed

verified

Computer forensics involves the scientif...

View Answer

Showing 21 - 40 of 100

Related Exams

Show Answer