Question: Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
Answer Options:
Answer: True
Question: What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?
Answer Options:
Answer: Macro viruses
Question: Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
Answer Options:
Answer: True
Question: Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?
Answer Options:
Answer: managed security service provider
Question: A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?
Answer Options:
Answer: APT
Question: Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
Answer Options:
Answer: True
Question: The focus of the 2002 Homeland Security Act is to provide financial incentives to software companies to improve their security measures.
Answer Options:
Answer: False
Question: A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?
Answer Options:
Answer: cybercriminal
Question: A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
Answer Options:
Answer: False
Question: Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation’s Internet infrastructure against cyberattacks?
Answer Options:
Answer: U.S. Computer Emergency Readiness Team
Question: A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?
Answer Options:
Answer: virus
Question: A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?
Answer Options:
Answer: intrusion detection system
Question: An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?
Answer Options:
Answer: virus signature
Question: A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?
Answer Options:
Answer: Bring your own device (BYOD)
Question: Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?
Answer Options:
Answer: SANS Institute
Question: In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
Answer Options:
Answer: exploit
Question: The most common computer security precaution taken by businesses is the installation of which of the following?
Answer Options:
Answer: firewall
Question: Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?
Answer Options:
Answer: Gramm-Leach-Bliley Act