A digital certificate system:

A digital certificate system:



a. uses third-party CAs to validate a user's identity.
b. uses digital signatures to validate a user's identity.
c. uses tokens to validate a user's identity.
d. are used primarily by individuals for personal correspondence.



Answer: A

______ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

______ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.





a. Stateful inspections
b. Intrusion detection systems
c. Application proxy filtering technologies
d. Packet filtering technologies




Answer: B

A firewall allows the organization to:

A firewall allows the organization to:



a. enforce a security policy on traffic between its network and the Internet.
b. check the accuracy of all transactions between its network and the Internet.
c. create an enterprise system on the Internet.
d. check the content of all incoming and outgoing e-mail messages



Answer: A

Biometric authentication:

Biometric authentication:




a. is inexpensive.
b. is used widely in Europe for security applications.
c. can use a person's face as a unique, measurable trait.
d. only uses physical traits as a measurement.




Answer: C

A token is a(n):

A token is a(n):



a. device the size of a credit card that contains access permission data.
b. type of smart card.
c. gadget that displays passcodes.
d. electronic marker attached to a digital authorization file.




Answer: C

Rigorous password systems:

Rigorous password systems:



a. are one of the most effective security tools.
b. may hinder employee productivity.
c. are costly to implement.
d. are easily disregarded by employees.




Answer: B

High-availability computing:

High-availability computing:




a. promises continuous availability.
b. promises the elimination of recovery time.
c. uses online transaction and backup systems.
d. helps firms recover quickly from a crash.



Answer: D

Downtime refers to periods of time in which:

Downtime refers to periods of time in which:



a. a computer system is malfunctioning.
b. a computer system is not operational.
c. a corporation is not operational.
d. a computer is not able to perform online transactions.




Answer: B

A CSO is a:

A CSO is a:



a. chief security officer.
b. computer security organization.
c. chief systems officer.
d. continuity systems officer.




Answer: A

ISO 17799:

ISO 17799:




a. requires financial institutions to ensure the security of customer data.
b. specifies best practices in information systems security and control.
c. imposes responsibility on companies and management to safeguard the accuracy of financial information.
d. outlines medical security and privacy rules.



Answer: B

The Sarbanes-Oxley Act:

The Sarbanes-Oxley Act:



a. requires financial institutions to ensure the security of customer data.
b. specifies best practices in information systems security and control.
c. imposes responsibility on companies and management to safeguard the accuracy of financial information.
d. outlines medical security and privacy rules.




Answer: C

The Health Insurance Portability and Accountability Act (HIPAA) of 1996:

The Health Insurance Portability and Accountability Act (HIPAA) of 1996:



a. requires financial institutions to ensure the security of customer data.
b. specifies best practices in information systems security and control.
c. imposes responsibility on companies and management to safeguard the accuracy of financial information.
d. outlines medical security and privacy rules.





Answer: D

Evil twins are:

Evil twins are:



a. Trojan horses that appears to the user to be a legitimate commercial software application.
b. e-mail messages that mimic the e-mail messages of a legitimate business.
c. fraudulent Web sites that mimic a legitimate business's Web site.
d. bogus wireless networks that look legitimate to users.



Answer: D

Pharming involves:

Pharming involves:



a. redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
b. pretending to be a legitimate business's representative in order to garner information about a security system.
c. setting up fake Web sites to ask users for confidential information.
d. using e-mails for threats or harassment.




Answer: A

Phishing involves:

Phishing involves:



a. redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
b. pretending to be a legitimate business's representative in order to garner information about a security system.
c. setting up fake Web sites to ask users for confidential information.
d. using e-mails for threats or harassment.




Answer: C

The approach taken by Akamai Technologies when it discovered its servers were under attack illustrates that:

The approach taken by Akamai Technologies when it discovered its servers were under attack illustrates that:



a. enforcing security is a complex endeavor that involves multiple approaches.
b. educating clients about their role in security is paramount.
c. multistep authentication procedures can cause more problems than solutions.
d. anti-virus software must be updated continually to remain effective.




Answer: A

How do hackers create a botnet?

How do hackers create a botnet?




a. Infecting Web shopping bots with malware
b. Using Web search bots to infect other computers
c. Causing other people's computers to become "zombie" PCs following a master computer
d. Infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door



Answer: C

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?



a. Virus
b. Worm
c. Trojan horse
d. Spyware





Answer: C

Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:

Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:



a. are usually embedded in legacy systems that are easy to access.
b. are not secure because the technology to secure them did not exist at the time the files were created.
c. have the potential to be accessed by large numbers of people and by groups outside of the organization.
d. are frequently available on the Internet.




Answer: C

All of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards refers to:

All of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards refers to:



a. legacy systems.
b. SSID standards.
c. vulnerabilities.
d. controls.




Answer: D

What is the most far-reaching effect of identity theft?

What is the most far-reaching effect of identity theft?



a. Corporations implementing more rigorous authentication procedures
b. More governmental control of security standards
c. Lowering of revenues and profits due to public mistrust of e-commerce safety
d. ISPs implementing more active counter-crime techniques




Answer: C

The fact that phishing is growing at an explosive rate indicates that:

The fact that phishing is growing at an explosive rate indicates that:




a. Internet security applications are less able to prevent cyber crime.
b. consumer trust of the Internet is too great.
c. the increasing use of the Internet for online finance is a factor in drawing attention from larger numbers of criminals.
d. consumers need to be educated about phishing and phishing techniques.





Answer: C