CIS Chapter 8
An acceptable use policy defines the acceptable level of access to information assets for different users. True False
False
Packet filtering catches most types of network attacks. True False
False
Public key encryption uses two keys. True False
True
Smartphones have the same security flaws as other Internet-connected devices. True False
True
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. True False
True
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? a. War driving b. Sniffing c. Cybervandalism d. Drive-by tapping e. Snooping
a. War driving
All of the following are currently being used as traits that can be profiled by biometric authentication except: a. fingerprints. b. facial characteristics. c. body odor. d. retinal images. e. voice.
c. body odor.
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: a. smart card authentication. b. biometric authentication. c. two-factor authentication. d. symmetric key authorization. e. token authentication.
c. two-factor authentication.
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. a. DPI b. MSSP c. NSP d. PKI e. UTM
e. UTM
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: a. phishing. b. pharming. c. spoofing. d. evil twins. e. click fraud.
e. click fraud.