ITSA255_Test1Review_Fall2017 #41-50

¡Supera tus tareas y exámenes ahora con Quizwiz!

In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.

True

The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.

True

War dialers are becoming more frequently used given the rise of Voice over IP (VoIP).

False

Bob is using a port scanner to identify open ports on a server in his environment. He is scanning a web server that uses Hypertext Transfer Protocol (HTTP). Which port should Bob expect to be open to support this service?

80

Which risk is most effectively mitigated by an upstream Internet service provider (ISP)?

Distributed denial of service (DDoS)

Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can benefit from traffic-monitoring applications.

False

Which one of the following governs the use of Internet of Things (IoT) by healthcare providers, such as physicians and hospitals?

Health Insurance Portability and Accountability Act (HIPAA)

Which type of denial of service attack exploits the existence of software flaws to disrupt a service?

Logic attack

Which element of the security policy framework requires approval from upper management and applies to the entire organization?

Policy

Which classification level is the highest level used by the U.S. federal government?

Top Secret


Conjuntos de estudio relacionados

Unit 2: Section 2 - Reactions of halide ions

View Set

Exam 1 Finance Test Review Questions

View Set

Chapter 7: Police Administration

View Set

Chapt 17: The 17th & 18th Centuries in Europe

View Set

Anatomy and Physiology Chapter 1 2 3 4 5

View Set

Ch. 3, and 4 Notes, reading quizzes, and homework

View Set