Académique Documents
Professionnel Documents
Culture Documents
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
________ are small files that your browser stores on your computer when you
visit Web sites and enable you to access Web sites without having to sign in
every time.
Cookies
The total cost of a cold site, including all customer labor and other expenses, is
always less than the cost of a hot site.
False
Which of the following systems procedures is specifically the responsibility of
operations personnel?
backing up system databases
Wireless networks are more secure than wired networks.
False
________ is a technique for intercepting computer communications, either
through a physical connection to a network or, in the case of wireless networks,
with no physical connection.
Sniffing
Which element of a security policy specifies how an organization will ensure the
enforcement of security programs and policies?
the general statement
of the security policy
To obtain a measure of probable loss, companies ________.
multiply
likelihood by the cost of the consequences
________, tiny files that gather demographic information, use a single code to
identify users by age, gender, location, likely income, and online activity.
Beacons
________ is the term used to denote viruses, worms, Trojan horses, spyware,
and adware.
Malware
Sniffing occurs when an intruder uses another site's IP address as if it were that
other site.
False
________ a site means to take extraordinary measures to reduce a system's
vulnerability, using special versions of the operating system, and eliminating
operating systems features and functions that are not required by the
application.
Hardening
A retina scan is a biometric authentication technique.
True
Drive-by sniffers monitor and intercept wireless traffic at will.
True
According to the elements of company security outlined in the NIST Handbook,
computer security is not constrained by societal factors.
False
Which of the following is used for biometric authentication?
Facial
features
Phishing is a technique for intercepting computer communications.
False
Faulty service includes incorrectly billing customers or sending the wrong
information to employees, but not incorrect data modification.
False
An example of a computer crime includes an employee who inadvertently installs
an old database on top of the current one.
False
Pretexting occurs when a person receives a confidential text message by
mistake and pretends to be the intended recipient.
False
You are transferring funds online through the Web site of a reputed bank. Which
of the following displayed in your browser's address bar will let you know that the
bank is using the SSL protocol?
Https
Security, like BPM, is a process that requires process management.
True
________ refers to things we do not know, while ________ is the likelihood of an
adverse occurrence.
Uncertainty; risk
46.
47.
48.
49.
50.
51.
52.
53.
54.