Question: When you join two relational database tables together, frequently the primary key in one table will be a __________ in the other table.

Answer Options:

Foreign key
International key
Primary key
Linked list
Entity

Answer: Foreign key

 

Question: The CRUD matrix shows:

Answer Options:

The crud that is coming into the system and how to quarantine it
Exactly how data are used and created by the major processes in the system
The 1
relationships on an ERD diagram
The external entities, process and major data flows from the Context DFD diagram
Where customers, relationships, users and developers will interact with a system

Answer: Exactly how data are used and created by the major processes in the system

 

Question: One common method to increase access speed is to:

Answer Options:

Use legacy databases in an indexed sequential access method
Encrypt all data with 256 byte encryption
Denormalize the tables
Delete all primary keys
Only use alphabetic data

Answer: Denormalize the tables

 

Question: Frame relay specifies data rates in the range of

Answer Options:

56 kbps – 45 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps
56 kbps – 2 mbps

Answer: 56 kbps – 45 mbps

 

Question: Virtual circuits are used with

Answer Options:

All WAN technologies
Point-to-point WANs
Statistical multiplexed WANs
None of the above

Answer: Statistical multiplexed WANs

 

Question: Information security is becoming increasingly important because of

Answer Options:

There is a general increase in criminal behavior in society
The increasing criticality of information to individuals and organizations
People are greedier these days
Organizations are wealthier these days

Answer: The increasing criticality of information to individuals and organizations

 

Question: Many users are vulnerable to

Answer Options:

Stolen usernames and passwords from a compromised site being used to compromise their bank accounts
Hackers compromising the IT systems at large financial institutions
Attacks on ATM machines
Demands for usernames and passwords at gunpoint

Answer: Stolen usernames and passwords from a compromised site being used to compromise their bank accounts

 

Question: The biggest time-consuming activity for most information security professionals is

Answer Options:

Fixing software bugs
Responding to information security incidents
Researching new technologies
Helping customers

Answer: Responding to information security incidents

 

Question: Desired competencies for information security professionals include all of the following except

Answer Options:

Risk management
Forensics
Secure SDLC
Marketing

Answer: Marketing

 

Question: A desired competency for information security professionals is

Answer Options:

Accounting
Marketing
End user awareness
Financial planning

Answer: End user awareness

 

Question: As the use of personal devices for work has increased, the work of information security professionals has

Answer Options:

Increased
Decreased
None of the above
Stayed the same

Answer: Increased

 

Question: Information security professionals report spending a lot of time on

Answer Options:

Political issues
Fixing software bugs
Developing internal security policies, standards and procedures
Researching new technologies

Answer: Researching new technologies

 

Question: The Internet is relevant for information security because

Answer Options:

It led to exploits from weaknesses in wireless networks
It exposed computers to attacks from around the world
It caused one of the most significant internet outages ever
It caused falsification of financial records at publicly traded companies

Answer: It exposed computers to attacks from around the world

 

Question: The gang of 414 is famous in the information security literature for

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Causing one of the most significant internet outages ever
Fabrication of financial records at publicly traded companies
Intruding into a number of high profile computer installations

Answer: Intruding into a number of high profile computer installations

 

Question: The Morris worm is well known in the information security literature for

Answer Options:

Fabrication of financial records at publicly traded companies
Intruding into a number of high profile computer installations
Causing one of the most significant internet outages ever
Stealing commercial information by exploiting weaknesses in wireless networks

Answer: Causing one of the most significant internet outages ever

 

Question: Windows 95 is important to information security for

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant internet outages ever

Answer: Popularizing computers among the masses

 

Question: HIPAA is important to information security for

Answer Options:

Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant internet outages ever
Driving demand for information security in a large sector of the US economy

Answer: Driving demand for information security in a large sector of the US economy

 

Question: Michael, a systems analyst, is preparing a closed wiki site for Northstate Bank. He has written permission from eight other companies to view their internal wiki sites, and also has approval from his manager and the project team to use these other sites for ideas and structure. This would be a form of:

Answer Options:

Business Process Automation
Business Process Improvement
Informal Benchmarking
Formal Benchmarking
Technology Analysis

Answer: Formal Benchmarking