Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Sean and Rob are discussing the psychological approaches security attacks. Sean says that one technique used is to ask for small amounts of information from the victim to maintain credibility. Rob says one technique is to use flattery or flirtation to gain support. Who is correct?
A. Both are correct.
B. Only Rob is correct.
C. Only Sean is correct.
D. Neither is correct.

2. Which psychological approach to social engineering relies on peer pressure to achieve results?
A. Conformity
B. Friendliness
C. Ingratiation
D. Impersonation

3. What advanced feature of password management tools requires a user to have a unique file on a separate storage device to open a password database?
A. In-memory protection
B. Random password grouping
C. Key file
D. Lock to user account

4. Security is generally comprised of what two action categories?
A. Aggressive measures and rapid response
B. Preventive measures and rapid response
C. Aggressive measures and compensatory response
D. Preventive measures and compensatory response

5. By 2017, the IRS estimates identity theft based on fraudulent tax returns could increase from current levels by how much?
A. $21 billion
B. $9 billion
C. $12 billion
D. $27 billion

6. Two technicians are discussing the principles and practices of information security. Technician A says that security practices should focus only on people and products, as the policies and procedures will naturally take of themselves. Technician B says that information security should properly focus on policies and procedures and people, as products are handled by the vendors' own specifications. Which technician is correct?
A. Both technicians are correct.
B. Technician A is correct.
C. Neither technician is correct.
D. Technician B is correct.

7. When building a comprehensive security strategy, what practical principle does setting up a data backup schedule fall under?
A. Send secure informationC. Block attacks
B. Minimize lossesD. Update defenses

8. Using the terminology of information security, which term would be used to describe a hurricane that's heading toward a data center in Miami?
A. Threat
B. Vulnerability
C. Risk
D. Threat agent

9. Which of the following qualities is a core aspect of information security?
A. Currency
B. Convenience
C. Confidentiality
D. Cardinality

10. In information security terminology, a malicious mobile code snippet that takes advantage of a flaw in a Web server's security to infect a company network would be considered a what?
A. Threat
B. Exploit
C. Vulnerability
D. Risk

11. The security manager for your network has instituted new authentication processes for the company's privileged information. Although it seems like a sound policy, you quickly find that salespeople are able to access budget projections that they do not have the authority to view. What characteristic of information is the new policy failing to protect?
A. Integrity
B. Availability
C. Reliability
D. Confidentiality

12. What was the most expensive single malicious attack to date, and how much did it cost those it infected?
A. Mydoom, $3.9 billion
B. Conficker, $9.2 billion
C. Stuxnet, $4.3 billion
D. Love Bug, $8.7 billion

13. The number one Internet fraud is the Nigerian 419 scam, which as of 2014, is growing at a 5% annual rate and has claimed an estimated __________ in losses.
A. $41 billion
B. $1.3 million
C. $9.3 billion
D. $42.3 million

14. What group often uses the term white hats to delineate between criminal and
noncriminal activity?
A. PoliticiansC. Hackers
B. Law enforcement officialsD. Security professionals

15. Security researchers warn that what class of device might be the next group targeted on a large scale by attackers?
A. Tablets
B. Automotive electronics
C. Smartphones
D. Personal medical devices

16. The relationship between security and convenience is
A. inversely proportional.
B. nonexistent.
C. directly proportional.
D. defined by the provider.

17. Suppose Robert gets a recorded phone call stating that his bank account has been infiltrated. He is instructed to call a specific phone number and enter his information to activate additional security measures. What type of social engineering technique is being used?
A. Hoax
B. Vishing
C. Impersonation
D. Whaling

18. Fraudulent use of stolen credit card information causes losses of how much annually?
A. More than $50 million
B. More than $5 billion
C. More than $500 million
D. More than $50 billion

19. Two technicians are discussing the rise in Internet attacks on businesses and individuals. Technician A argues that the rise of universally connected mobile devices has made it easier to launch attacks at anytime from anywhere, while Technician B argues the greater availability of automated, user-friendly attack tools is the reason behind the rise in attacks. Which technician is correct?
A. Both technicians are correct.
B. Only Technician A is correct.
C. Neither technician is correct.
D. Only Technician B is correct.

20. Which federal legislation mandates protection of patients' health information in paper or electronic form?
A. GLBA
B. Sarbox
C. COPPA
D. HIPAA

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92529447
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

A club consists of 10 seniors 12 juniors and 15 sophomores

A club consists of 10 seniors, 12 juniors, and 15 sophomores. An organizing committee of size 5 is chosen randomly (with all subsets of size 5 likely). Find the probability that the committee has at least one representat ...

Meannbsp3290 milesstandard deviation ofnbsp384 mileswhat is

Mean 3290 miles Standard Deviation of 384 miles What is the probability that the mean of a sample of 33 cars would be less than 3160 miles?

Suppose the following matrix represents the number of saws

Suppose the following matrix represents the number of saws ordered from your company each month over the last year. saws = [1,4,5,3,7,5,3,10,12,8, 7, 4] All the numbers should be zero or positive. (a) Use an if statement ...

Find minimal dfas for the following languages in each case

Find minimal dfa's for the following languages. In each case prove that the result is minimal. (1) L = {a n bm> :n≥2,m≥1}. (2)L = {a n :n ≥ 0,n ≠ 3} (3) L = {a n :n mod 3 = 0}∪{a n : n mod 5 = 1}

Question suppose you work in the it department of global

Question : Suppose you work in the IT department of Global Hotels, a multinational hotel chain. Global Hotels runs several specialized business support systems, including a guest reservations system that was developed in ...

Question suppose you need to store 10 tb of data in a new

Question Suppose you need to store 10 TB of data in a new data center. How many 2 GB hard disks do you need if the hard disk should store up to 70% of their capacity using RAID 0, RAID 1, RAID 3, or RAID 5.

Question suppose you are asked to automate the prescription

Question : Suppose you are asked to automate the prescription fulfillment system for a pharmacy, MailDrugs. When an order comes in, it is given as a sequence of requests, "x1 ml of drug y1," "x2 ml of drug y2," "x3 ml of ...

You often read in the newspapers that the fed has just

You often read in the newspapers that the Fed has just lowered the discount rate. Does this signal that the Fed is moving toward a more expansionary monetary policy? Why or why not?

Question suppose 4 packets of a message each of l bits

Question : Suppose 4 packets of a message, each of L bits arrive at a switch (router) and traverse a link with rate R bps to the destination. Further, suppose that the link is free when the first packet arrives, and the ...

Assignment -note in your assignment how you arrived at your

Assignment - Note: In your assignment, how you arrived at your solution is as important (if not more so) than the solution itself and will be assessed accordingly. There may be more than one way to find a solution, and y ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As