Chapter 4 Which of the following employees typically poses the most

subject Type Homework Help
subject Pages 8
subject Words 836
subject Authors Brad Prince, R. Kelly Rainer

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Package Title: Reading Questions Chapter 4
Course Title: Rainer IIS 5e
Chapter Number: 4
Question type: Multiple-Choice
1) The threats to information security are _____, and the greatest threat is _____.
a) increasing, human
b) decreasing, human
c) increasing, technological
d) decreasing, technological
e) staying about the same, software
2) The emergence of the Internet has decreased the threats to information security.
page-pf2
3) If you have copied a software package (computer program) from a friend without paying for
it, you are guilty of software piracy.
4) Low level employees pose the greatest threat to information security.
5) Which of the following employees typically poses the most significant threat to information
security?
page-pf3
a) Janitors
b) Contract labor
c) Consultants
d) IS employees
6) Which of the following is not a social engineering technique?
a) Tailgating
b) Shoulder surfing
c) Careless internet surfing
d) All of the choices are social engineering techniques.
e) None of the choices are social engineering techniques
page-pf4
7) You should regularly delete any spyware that might be residing on your computer, because it
may be dangerous.
8) Which type of remote software attack does not require user action?
a) virus
b) worm
c) phishing attack
d) denial-of service attack
9) Which type of alien software uses your computer to send emails that look like they came from
you to all the people in your address book?
a) adware
page-pf5
b) spyware
c) spamware
d) cookies
10) Which of the following would be an example of a SCADA attack?
a) Bank accounts are hacked into after Internet purchases
b) Social Security numbers are deleted from a companys database.
c) Computer viruses are introduced into the electrical companys systems resulting ain a
shutdown of the power plant.
d) Email accounts are hacked and kinky messages are sent to all fo the users contacts
11) Risk management identifies, controls, and minimizes the impact of threats to the
organization's information security.
page-pf6
12) Which if the following is not a common risk mitigation strategy?
a) Risk analysis.
b) Risk limitation.
c) Risk acceptance.
d) Risk trasnference.
13) A password system on a computer network is an example of which type of information
security control?
a) physical
b) access
c) communication
page-pf7
14) Which of the following statements is true?
a) Multifactor authentication systems are more reliable and less expensive than single-factor.
b) Multifactor authentication systems are more reliable and more expensive than single-factor.c)
Multifactor authentication systems are less reliable and less expensive than single-factor d)
Multifactor and single-factor authentications have the same degree of reliability.
15) ____________ is an encryption standard used for secure transactions such as credit card
processing and online banking.
a) VPN
b) TLS
page-pf8
c) DMZ
d) Whitelisting

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.