MBA5141 Chapter-8

1.Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
A False

2. Currently, the protocols used for secure information transfer over the Internet are:
A SSL, TLS, and S-HTTP.
 

3. A NAT conceals the IP addresses of the organization’s internal host computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems.
A True

4. The Sarbanes-Oxley Act:
A imposes responsibility on companies and management to safeguard the accuracy of financial information.

5. ________ is malware that hijacks a user’s computer and demands payment in return for giving back access.
A Ransomware
 

6. Which of the following statements about wireless security is not true?
A Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

7. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
A DDoS
 

8. All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

A phishing.
 

9. Implementation controls:

A audit the systems development process at various points to ensure that the process is properly controlled and managed.
 

10. According to Accenture and Ponemon Institute’s Ninth Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime in 2018 for benchmarked organizations was approximately:

A $13 million.
 

11. The HIPAA Act of 1996:

A outlines medical security and privacy rules.
 

12. Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

A Controls
 

13. Mobile devices typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses, and therefore do not require any special protections.

A False

14. Authentication refers to verifying that people are who they claim to be.

A True

15. Which of the following statements about blockchain is not true?

A The data represented in a blockchain is maintained in a central database.
 

16. CryptoLocker is an example of which of the following?

A Ransomware/Trojan
 

17. Which of the following defines acceptable uses of a firm’s information resources and computing equipment?

A An AUP

18. Two-factor authentication utilizes a(n):

A a multistep process of authentication.
 

Leave a Reply

Your email address will not be published. Required fields are marked *