Question: In the TCP/IP stack, WAN technologies are considered to be instances of the

Answer Options:

Transport layer
Network layer
Physical layer
Data link layer

Answer: Data link layer

 

Question: ATM specifies data rates in the range of

Answer Options:

56 kbps – 45 mbps
56 kbps – 2 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps

Answer: 56 kbps – 2 mbps

 

Question: Frame relay specifies data rates in the range of

Answer Options:

56 kbps – 45 mbps
50.112 mbps – 150.336 mbps
1.544 mbps – 622.08 mbps
56 kbps – 2 mbps

Answer: 56 kbps – 45 mbps

 

Question: Virtual circuits are used with

Answer Options:

All WAN technologies
Point-to-point WANs
Statistical multiplexed WANs
None of the above

Answer: Statistical multiplexed WANs

 

Question: Information security is becoming increasingly important because of

Answer Options:

There is a general increase in criminal behavior in society
The increasing criticality of information to individuals and organizations
People are greedier these days
Organizations are wealthier these days

Answer: The increasing criticality of information to individuals and organizations

 

Question: Many users are vulnerable to

Answer Options:

Stolen usernames and passwords from a compromised site being used to compromise their bank accounts
Hackers compromising the IT systems at large financial institutions
Attacks on ATM machines
Demands for usernames and passwords at gunpoint

Answer: Stolen usernames and passwords from a compromised site being used to compromise their bank accounts

 

Question: The biggest time-consuming activity for most information security professionals is

Answer Options:

Fixing software bugs
Responding to information security incidents
Researching new technologies
Helping customers

Answer: Responding to information security incidents

 

Question: Desired competencies for information security professionals include all of the following except

Answer Options:

Risk management
Forensics
Secure SDLC
Marketing

Answer: Marketing

 

Question: A desired competency for information security professionals is

Answer Options:

Accounting
Marketing
End user awareness
Financial planning

Answer: End user awareness

 

Question: As the use of personal devices for work has increased, the work of information security professionals has

Answer Options:

Increased
Decreased
None of the above
Stayed the same

Answer: Increased

 

Question: Information security professionals report spending a lot of time on

Answer Options:

Political issues
Fixing software bugs
Developing internal security policies, standards and procedures
Researching new technologies

Answer: Researching new technologies

 

Question: The Internet is relevant for information security because

Answer Options:

It led to exploits from weaknesses in wireless networks
It exposed computers to attacks from around the world
It caused one of the most significant internet outages ever
It caused falsification of financial records at publicly traded companies

Answer: It exposed computers to attacks from around the world

 

Question: The gang of 414 is famous in the information security literature for

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Causing one of the most significant internet outages ever
Fabrication of financial records at publicly traded companies
Intruding into a number of high profile computer installations

Answer: Intruding into a number of high profile computer installations

 

Question: The Morris worm is well known in the information security literature for

Answer Options:

Fabrication of financial records at publicly traded companies
Intruding into a number of high profile computer installations
Causing one of the most significant internet outages ever
Stealing commercial information by exploiting weaknesses in wireless networks

Answer: Causing one of the most significant internet outages ever

 

Question: Windows 95 is important to information security for

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant internet outages ever

Answer: Popularizing computers among the masses

 

Question: HIPAA is important to information security for

Answer Options:

Intruding into a number of high profile computer installations
Popularizing computers among the masses
Causing one of the most significant internet outages ever
Driving demand for information security in a large sector of the US economy

Answer: Driving demand for information security in a large sector of the US economy

 

Question: The ILOVEYOU virus is important to information security for

Answer Options:

Popularizing computers among the masses
Intruding into a number of high profile computer installations
Exposing the implications of international differences in cyber-law
Stealing commercial information by exploiting weaknesses in wireless networks

Answer: Exposing the implications of international differences in cyber-law

 

Question: Albert Gonzalez and T.J. Maxx are well known in the information security literature for

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Intruding into a number of high profile computer installations
Causing one of the most significant internet outages ever
Fabrication of financial records at publicly traded companies

Answer: Stealing commercial information by exploiting weaknesses in wireless networks