Filters
Question type

Study Flashcards

Which of the following is not one of the five steps for creating an information security plan?


A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Surprisingly, the biggest issue surrounding information security is not a people issue, but a technical issue.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a part of the e-mail privacy policy stipulations?


A) It defines who legitimate e-mail users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's e-mail
D) It informs people that the organization has full control over e-mail once it is transmitted outside the organization

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Distributed denial-of-service attack (DDoS) attacks from multiple __________ that flood a Web site with so many requests for service that it slows down or crashes.

Correct Answer

verifed

verified

Key logger or key trapper software is a __________ that when installed on a computer, records every keystroke and mouse click.

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?


A) Ethics
B) ePolicies
C) All of the above
D) None of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the most common type of defence within detection and response technologies?


A) Malicious code
B) Token
C) User ID
D) Antivirus software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ____________ computer use policy contains general principles to guide computer user behaviour.

Correct Answer

verifed

verified

Obtain ___________ support is the last step for creating an information security plan.

Correct Answer

verifed

verified

What is social engineering?


A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

The purpose of ______________ is to provide Canadians with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?


A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

How individuals behave toward each other, how they handle information, computer technologies, and information systems, are largely influenced by people's ________________.

Correct Answer

verifed

verified

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?


A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is identity theft?


A) Is the forging of someone's identity for the purpose of fraud
B) Is monitoring emails
C) Is hacking in a computer system with the purpose of stealing information
D) Is buying illegal information from a hacker

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

Who works at the request of the system owners to find system vulnerabilities and plug the holes?


A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 101 - 120 of 171

Related Exams

Show Answer