Chapter 8 quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? Vulnerabilities SSID standards Controls Legacy systems Security policy

Controls

A foreign country attempting to access government networks in order to disable a national power grid is an example of: -cyberwarfare. -phishing. -evil twins. -denial-of-service attacks. -cyberterrorism.

Cyberwarfare

Which of the following statements about Internet security is not true? -The use of P2P networks can expose a corporate computer to outsiders. -Instant messaging can provide hackers access to an otherwise secure network. -Email attachments can serve as a springboard for malicious software. -A corporate network without access to the Internet is more secure than one that provides access. -Data stored in cloud systems is not vulnerable to attack.

Data Stored in cloud systems is not vulnerable to attack.

Which of the following focuses primarily on the technical issues of keeping systems up and running? -An AUP -An information systems audit -Security policies -Business continuity planning -Disaster recovery planning

Disaster recovery planning

Most IoT devices support sophisticated security approaches. True False

False

________ is malware that hijacks a user's computer and demands payment in return for giving back access. -A virus -Ransomware -A Trojan horse -An evil twin -Spyware

Ransomware

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? -Security policy -Business impact analysis -Business continuity plan -Risk assessment -AUP

Risk Assessment

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: -malware. -hacking. -vandalism. -sniffing. -denial-of-service attacks.

Sniffing

All of the following have contributed to an increase in software flaws except: -the growing complexity of software programs. -the increase in malicious intruders seeking system access. -demands for timely delivery to markets. -the inability to fully test programs. -the growing size of software programs.

The increase in malicious intruders seeking system access

Which of the following is the single greatest cause of network security breaches? -Cyberwarfare -Trojan horses -Bugs -Viruses -User lack of knowledge

User Lack of knowledge


संबंधित स्टडी सेट्स

N5451 Skills Lab > Video Quizzes > Module 9. Skin Integrity and Wound Care

View Set

Chapter 3 Government Sections 1,2, and 3

View Set

Non-specific Immunity/14 (looked at)

View Set

Life and Health - Life Insurance Basics

View Set