Unit 6 - Review Question
Unit 6 - Review Question
Class:
1) DoS attacks are one of the most economically damaging kinds of computer crime.
2) Wireless networks are vulnerable to penetration because radio frequency bands are easy to
scan.
5) An acceptable use policy defines the acceptable level of access to information assets for
different users.
6) Unauthorized access is a security challenge that is most likely to occur in which of the
following points of a corporate network?
A) client computer
B) communications lines
C) corporate server
D) internal corporate back-end system
8) Inputting data into a poorly programmed Web form in order to disrupt a company's
systems and networks is called
A) a Trojan horse.
B) an SQL injection attack.
C) key logging.
D) a DDoS attack.
1
10) An independent computer program that copies itself from one computer to another over a
network is called a
A) worm.
B) Trojan horse.
C) bug.
D) pest.
11) Analysis of an information system that rates the likelihood of a security incident
occurring and its cost is included in a(n)
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
12) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the
competitor's advertising costs up. This is an example of
A) phishing.
B) pharming.
C) spoofing.
D) click fraud.
14) Which of the following is not an example of a computer used as a target of crime?
A) knowingly accessing a protected computer to commit fraud
B) accessing a computer system without authority
C) illegally accessing stored electronic communication
D) threatening to cause damage to a protected computer
15) You have been hired as a security consultant for a law firm. Which of the following
constitutes the greatest source of security threats to the firm?
A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption
16) How do software vendors correct flaws in their software after it has been distributed?
A) issue bug fixes
B) issue patches
C) re-release software
D) issue updated versions
2
17) The most common type of electronic evidence is
A) voice mail.
B) spreadsheets.
C) instant messages.
D) e-mail.
19) A(n) ________ system is used to identify and authorize different categories of system
users and specify which portions of the organization's systems each user can access.
A) identity management
B) AUP
C) authentication
D) firewall
20) Which of the following is not a trait used for identification in biometric systems?
A) retinal image
B) voice
C) hair color
D) face