Computer Security Quiz 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Alan withdraws cash from an ATM belonging to Bank X that is coming from his account with Bank Y. What is Alan's relationship with Bank Y?

Customer

Although a Content Management System (CMS) is not vulnerable to the same attacks as any server or other software, it also never faces a vulnerability.

False

Blacklists identify reputable email servers.

False

In email, "From" identifies the mail protocol being used, and also may identify the MTA software.

False

Public-key certificates do not carry a range of effective dates, which means a certificate can be set to never expirE.

False

The Payment Card Industry (PCI) Council has only one priority: to assist merchants and financial institutions in understanding and implementing standards for security policies, technologies, and ongoing processes that protect their payment systems from breaches and theft of cardholder data.

False

The language that's the foundation of most Web pages is:

Hypertext Markup Language (HTML)

What type of organizations are required to comply with the Sarbanes-Oxley (SOX) Act?

Publicly traded companies

A web host contains five separate parts: Which is "NOT" part of the five?

SSL management

The Web address http://[email protected]/login.html is an example of:

misleading syntax

ASPX is:

ASP scripting extended to support Microsoft's .NET framework

Betty visits a local library with her young children. She notices that someone using a computer terminal in the library is visiting pornographic websites. What law requires that the library filter offensive web content for minors?

Children's Internet Protection Act (CIPA)

Alan withdraws cash from an ATM belonging to Bank X that is coming from his account with Bank Y. What is Alan's relationship with Bank X?

Consumer

To manage the site's contents and construct Web pages most modern sites use:

Content Management System

MIME formatting does not support rich emails, such as those that include boldface text, italics, bulleted lists, and graphics.

False

Sarbanes-Oxley Act (SOX) Section 404 compliance requirements are highly specific.

False

Structured Query Language (SQL) is a front-end, object-oriented interface for databases.

False

Programming traditions in the C programming language treat the "null" character (a character whose code is all 0s) as the marker for the end of a text string.

Obfuscating syntax

The Federal Trade Commission (FTC) Safeguards Rule requires a financial institution to create a written information security program that must state how the institution collects and uses customer data.

True

The "trust but verify" maxim applies to the Web site usage management technique of:

monitoring


Ensembles d'études connexes

Personal Finance: Chapter 5- Consumer Credit

View Set

ulcerative colitis, crohns disease, IBSyndrome, bowel obstruction

View Set

Human Intelligence CFA (Retort and The People, Yes)

View Set