CIS110 - Chapter 4 Info Security Quiz

Ace your homework & exams now with Quizwiz!

XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?

Biometric

T/F - Authentication occurs after authorization.

False

________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social Engineering

________ collects personal information about users without their consent.

Spyware

You lose the company's USB with your sales spreadsheets on it. This is ________ and is an ________ mistake.

a human error; unintentional

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ________ strategy.

acceptance

Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary.

false

Onity replaced all vulnerable hotel room locks after someone published the computer code for an unlocking device.

false

The 2017 Equifax data breach was more damaging to lenders than to consumers.

false

Auditing ________ the computer means auditors check inputs, outputs, and processing.

through

If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy.

true

Social engineering is an unintentional threat on the part of the employee.

true

VPN is a trusted network.

true

Weak passwords can be addressed through multi-factor authentication.

true

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.

true


Related study sets

Employment Law Final Study Terms

View Set

Differences of the Earth, Moon & Sun - 5th grade CSE

View Set

Medical Terminology CH. 11,12,13,14,15,18

View Set

Chapter Five: Life Insurance Underwriting and Policy Issue

View Set

Chapter 3: Life Insurance Policy Riders, Provisions, Options, and Exclusions

View Set

Ethical Issues Exam 1 (Chapters 1-6)

View Set