ITSA255_Test1Review_Fall2017 #41-50
In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.
True
The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.
True
War dialers are becoming more frequently used given the rise of Voice over IP (VoIP).
False
Bob is using a port scanner to identify open ports on a server in his environment. He is scanning a web server that uses Hypertext Transfer Protocol (HTTP). Which port should Bob expect to be open to support this service?
80
Which risk is most effectively mitigated by an upstream Internet service provider (ISP)?
Distributed denial of service (DDoS)
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can benefit from traffic-monitoring applications.
False
Which one of the following governs the use of Internet of Things (IoT) by healthcare providers, such as physicians and hospitals?
Health Insurance Portability and Accountability Act (HIPAA)
Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
Logic attack
Which element of the security policy framework requires approval from upper management and applies to the entire organization?
Policy
Which classification level is the highest level used by the U.S. federal government?
Top Secret