This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Package Title: Reading Questions Chapter 4
Course Title: Rainer IIS 5e
Chapter Number: 4
Question type: Multiple-Choice
1) The threats to information security are _____, and the greatest threat is _____.
a) increasing, human
b) decreasing, human
c) increasing, technological
d) decreasing, technological
e) staying about the same, software
2) The emergence of the Internet has decreased the threats to information security.
3) If you have copied a software package (computer program) from a friend without paying for
it, you are guilty of software piracy.
4) Low level employees pose the greatest threat to information security.
5) Which of the following employees typically poses the most significant threat to information
security?
a) Janitors
b) Contract labor
c) Consultants
d) IS employees
6) Which of the following is not a social engineering technique?
a) Tailgating
b) Shoulder surfing
c) Careless internet surfing
d) All of the choices are social engineering techniques.
e) None of the choices are social engineering techniques
7) You should regularly delete any spyware that might be residing on your computer, because it
may be dangerous.
8) Which type of remote software attack does not require user action?
a) virus
b) worm
c) phishing attack
d) denial-of service attack
9) Which type of alien software uses your computer to send emails that look like they came from
you to all the people in your address book?
a) adware
b) spyware
c) spamware
d) cookies
10) Which of the following would be an example of a SCADA attack?
a) Bank accounts are hacked into after Internet purchases
b) Social Security numbers are deleted from a company’s database.
c) Computer viruses are introduced into the electrical company’s systems resulting ain a
shutdown of the power plant.
d) Email accounts are hacked and kinky messages are sent to all fo the user’s contacts
11) Risk management identifies, controls, and minimizes the impact of threats to the
organization's information security.
12) Which if the following is not a common risk mitigation strategy?
a) Risk analysis.
b) Risk limitation.
c) Risk acceptance.
d) Risk trasnference.
13) A password system on a computer network is an example of which type of information
security control?
a) physical
b) access
c) communication
14) Which of the following statements is true?
a) Multifactor authentication systems are more reliable and less expensive than single-factor.
b) Multifactor authentication systems are more reliable and more expensive than single-factor.c)
Multifactor authentication systems are less reliable and less expensive than single-factor d)
Multifactor and single-factor authentications have the same degree of reliability.
15) ____________ is an encryption standard used for secure transactions such as credit card
processing and online banking.
a) VPN
b) TLS
c) DMZ
d) Whitelisting
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.