CIS110 - Chapter 4 Info Security Quiz
XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?
Biometric
T/F - Authentication occurs after authorization.
False
________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social Engineering
________ collects personal information about users without their consent.
Spyware
You lose the company's USB with your sales spreadsheets on it. This is ________ and is an ________ mistake.
a human error; unintentional
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ________ strategy.
acceptance
Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary.
false
Onity replaced all vulnerable hotel room locks after someone published the computer code for an unlocking device.
false
The 2017 Equifax data breach was more damaging to lenders than to consumers.
false
Auditing ________ the computer means auditors check inputs, outputs, and processing.
through
If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy.
true
Social engineering is an unintentional threat on the part of the employee.
true
VPN is a trusted network.
true
Weak passwords can be addressed through multi-factor authentication.
true
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.
true