Computer Security Quiz 12
Alan withdraws cash from an ATM belonging to Bank X that is coming from his account with Bank Y. What is Alan's relationship with Bank Y?
Customer
Although a Content Management System (CMS) is not vulnerable to the same attacks as any server or other software, it also never faces a vulnerability.
False
Blacklists identify reputable email servers.
False
In email, "From" identifies the mail protocol being used, and also may identify the MTA software.
False
Public-key certificates do not carry a range of effective dates, which means a certificate can be set to never expirE.
False
The Payment Card Industry (PCI) Council has only one priority: to assist merchants and financial institutions in understanding and implementing standards for security policies, technologies, and ongoing processes that protect their payment systems from breaches and theft of cardholder data.
False
The language that's the foundation of most Web pages is:
Hypertext Markup Language (HTML)
What type of organizations are required to comply with the Sarbanes-Oxley (SOX) Act?
Publicly traded companies
A web host contains five separate parts: Which is "NOT" part of the five?
SSL management
The Web address http://[email protected]/login.html is an example of:
misleading syntax
ASPX is:
ASP scripting extended to support Microsoft's .NET framework
Betty visits a local library with her young children. She notices that someone using a computer terminal in the library is visiting pornographic websites. What law requires that the library filter offensive web content for minors?
Children's Internet Protection Act (CIPA)
Alan withdraws cash from an ATM belonging to Bank X that is coming from his account with Bank Y. What is Alan's relationship with Bank X?
Consumer
To manage the site's contents and construct Web pages most modern sites use:
Content Management System
MIME formatting does not support rich emails, such as those that include boldface text, italics, bulleted lists, and graphics.
False
Sarbanes-Oxley Act (SOX) Section 404 compliance requirements are highly specific.
False
Structured Query Language (SQL) is a front-end, object-oriented interface for databases.
False
Programming traditions in the C programming language treat the "null" character (a character whose code is all 0s) as the marker for the end of a text string.
Obfuscating syntax
The Federal Trade Commission (FTC) Safeguards Rule requires a financial institution to create a written information security program that must state how the institution collects and uses customer data.
True
The "trust but verify" maxim applies to the Web site usage management technique of:
monitoring