0% found this document useful (0 votes)
46 views

Unit 6 - Review Question

This document contains a review quiz with true/false and multiple choice questions about various topics related to information security, including denial of service attacks, wireless network vulnerabilities, computer worms and viruses, sniffers, acceptable use policies, points of vulnerability on a corporate network, antivirus software effectiveness, SQL injection attacks, password systems, computer worms, risk assessments, click fraud, evil twins, computer crimes, greatest security threats, software fixes, common electronic evidence, firewall purposes, identity management systems, and biometric identification traits.

Uploaded by

linhnhp.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Unit 6 - Review Question

This document contains a review quiz with true/false and multiple choice questions about various topics related to information security, including denial of service attacks, wireless network vulnerabilities, computer worms and viruses, sniffers, acceptable use policies, points of vulnerability on a corporate network, antivirus software effectiveness, SQL injection attacks, password systems, computer worms, risk assessments, click fraud, evil twins, computer crimes, greatest security threats, software fixes, common electronic evidence, firewall purposes, identity management systems, and biometric identification traits.

Uploaded by

linhnhp.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Name:

Class:

Review Quiz Week 5:


True or False questions:

1) DoS attacks are one of the most economically damaging kinds of computer crime.

2) Wireless networks are vulnerable to penetration because radio frequency bands are easy to
scan.

3) Computer worms spread much more rapidly than computer viruses.

4) Sniffers enable hackers to steal proprietary information from anywhere on a network,


including e-mail messages, company files, and confidential reports.

5) An acceptable use policy defines the acceptable level of access to information assets for
different users.

Multiple Choices questions:

6) Unauthorized access is a security challenge that is most likely to occur in which of the
following points of a corporate network?
A) client computer
B) communications lines
C) corporate server
D) internal corporate back-end system

7) Most antivirus software is effective against


A) only those viruses active on the Internet and through e-mail.
B) any virus.
C) any virus except those in wireless communications applications.
D) only those viruses already known when the software is written.

8) Inputting data into a poorly programmed Web form in order to disrupt a company's
systems and networks is called
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.

9) Rigorous password systems


A) are one of the most effective security tools.
B) may hinder employee productivity.
C) are costly to implement.
D) are often disregarded by employees.

1
10) An independent computer program that copies itself from one computer to another over a
network is called a
A) worm.
B) Trojan horse.
C) bug.
D) pest.

11) Analysis of an information system that rates the likelihood of a security incident
occurring and its cost is included in a(n)
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.

12) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the
competitor's advertising costs up. This is an example of
A) phishing.
B) pharming.
C) spoofing.
D) click fraud.

13) Evil twins are


A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) e-mail messages that mimic the e-mail messages of a legitimate business.
C) fraudulent Web sites that mimic a legitimate business’s Web site.
D) bogus wireless network access points that look legitimate to users.

14) Which of the following is not an example of a computer used as a target of crime?
A) knowingly accessing a protected computer to commit fraud
B) accessing a computer system without authority
C) illegally accessing stored electronic communication
D) threatening to cause damage to a protected computer

15) You have been hired as a security consultant for a law firm. Which of the following
constitutes the greatest source of security threats to the firm?
A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption

16) How do software vendors correct flaws in their software after it has been distributed?
A) issue bug fixes
B) issue patches
C) re-release software
D) issue updated versions

2
17) The most common type of electronic evidence is
A) voice mail.
B) spreadsheets.
C) instant messages.
D) e-mail.

18) A firewall allows the organization to


A) prevent unauthorized communication both into and out of the network.
B) monitor network hot spots for signs of intruders.
C) prevent known spyware and malware from entering the system.
D) all of the above.

19) A(n) ________ system is used to identify and authorize different categories of system
users and specify which portions of the organization's systems each user can access.
A) identity management
B) AUP
C) authentication
D) firewall

20) Which of the following is not a trait used for identification in biometric systems?
A) retinal image
B) voice
C) hair color
D) face

You might also like