Question: The gang of 414 is famous in the information security literature for

Answer Options:

Stealing commercial information by exploiting weakness in wireless networks
Gaining unauthorized access to computers and systems
Developing an early prototype of a virus
Being the first known phishing attackers

Answer: Gaining unauthorized access to computers and systems

 

Question: The Morris worm is well known in the information security literature for

Answer Options:

Falsification of financial records at publicly traded companies
Intruding into a number of high profile computer installations
Causing one of the most significant Internet outages ever
Stealing commercial information by exploiting weakness in wireless networks

Answer: Causing one of the most significant Internet outages ever

 

Question: Windows 95 is important to information security for

Answer Options:

Stealing commercial information by exploiting weakness in wireless networks
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant Internet outages ever

Answer: Popularizing computers among the masses

 

Question: HIPAA is important to information security for

Answer Options:

Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant Internet outages ever
Driving demand for information security in a large sector of the US economy

Answer: Driving demand for information security in a large sector of the US economy

 

Question: The ILOVEYOU virus is important to information security for

Answer Options:

Popularizing computers among the masses
Intruding into a number of high profile computer installations
Exposing the implications of international differences in cyber-law
Stealing commercial information by exploiting weakness in wireless networks

Answer: Exposing the implications of international differences in cyber-law

 

Question: Albert Gonzalez and TJ Maxx are well known in the information security literature for

Answer Options:

Stealing commercial information by exploiting weakness in wireless networks
Intruding into a number of high profile computer installations
Causing one of the most significant Internet outages ever
Falsification of financial records at publicly traded companies

Answer: Stealing commercial information by exploiting weakness in wireless networks

 

Question: Information security is defined as

Answer Options:

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

Answer: Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

 

Question: Confidentiality is

Answer Options:

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
Protecting information and information systems from unauthorized use
Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
Ensuring timely and reliable access to and use of information

Answer: Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices

 

Question: Integrity is

Answer Options:

Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
Ensuring timely and reliable access to and use of information
Protecting information and information systems from unauthorized use
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

Answer: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

 

Question: Availability is

Answer Options:

Ensuring timely and reliable access to and use of information
Protecting information and information systems from unauthorized use

Answer: Ensuring timely and reliable access to and use of information

 

Question: Which of the following is true of synaptic signaling and hormonal signaling? Check all that apply.

Answer Options:

Hormone travel over long distance
Both nervous signaling and hormone signaling work through gap junctions
Both nervous signaling and hormone signaling act on target cells

Answer: Hormone travel over long distance Both nervous signaling and hormone signaling act on target cells

 

Question: From the perspective of the cell receiving the message, the three stages of cell signaling are

Answer Options:

Signal reception, cellular response, and cell division
Signal reception, nucleus disintegration, and new cell generation
Signal reception, signal transduction, and cellular response
Signal reception, cell wall formation, and signal reception

Answer: Signal reception, signal transduction, and cellular response

 

Question: Signal molecules that are water soluble ___________. Check all that apply.

Answer Options:

Are always large
Have polar or charged components
Are only able to pass through the plasma membrane by active transport
Bind to specific sites on receptor proteins in a membrane

Answer: Have polar or charged components Bind to specific sites on receptor proteins in a membrane

 

Question: Which of the following are chemical messengers that pass through the plasma membrane of cells and have receptor molecules in the cytoplasm? Check all that apply.

Answer Options:

Testosterone
Insulin
Nitric oxide

Answer: Testosterone Nitric oxide

 

Question: A signal transduction pathway is initiated when a __ binds to a receptor.

Answer Options:

G-protein
Calmodulin
Ion channel
Cyclic AMP

Answer: G-protein

 

Question: Wide area networks are defined by their ability to

Answer Options:

Operate over high bandwidths
Provide very high data rates
Provide data communication services to a large number of users
Operate over large distances

Answer: Operate over large distances

 

Question: WAN technologies use broadcast

Answer Options:

True
False

Answer: False

 

Question: When a device has data to be delivered over a WAN network

Answer Options:

It stops the existing traffic over the medium to send the data
The data is merged with the existing traffic
None of the above
It waits for the medium to become idle

Answer: The data is merged with the existing traffic