Question: Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.

Answer Options:

True
False

Answer: True

 

Question: What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?

Answer Options:

Macro viruses
Zombies
Logic bombs
Trojan horses

Answer: Macro viruses

 

Question: Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.

Answer Options:

True
False

Answer: True

 

Question: Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?

Answer Options:

product lifecycle management
computer forensics
security dashboard
managed security service provider

Answer: managed security service provider

 

Question: A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?

Answer Options:

APT
rootkit
trojan horse
DDoS

Answer: APT

 

Question: Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.

Answer Options:

True
False

Answer: True

 

Question: The focus of the 2002 Homeland Security Act is to provide financial incentives to software companies to improve their security measures.

Answer Options:

True
False

Answer: False

 

Question: A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?

Answer Options:

hacktivist
black hat hacker
industrial spy
cybercriminal

Answer: cybercriminal

 

Question: A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

Answer Options:

True
False

Answer: False

 

Question: Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation’s Internet infrastructure against cyberattacks?

Answer Options:

The National Institute of Standards and Technology
The Science and Technology Directorate of Homeland Security
Carnegie Mellon’s Computer Response Team
U.S. Computer Emergency Readiness Team

Answer: U.S. Computer Emergency Readiness Team

 

Question: A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?

Answer Options:

virus
operating system
CAPTCHA
cookie

Answer: virus

 

Question: A software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?

Answer Options:

virtual private network
anti-virus device
intrusion detection system
intrusion prevention system

Answer: intrusion detection system

 

Question: An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?

Answer Options:

Trojan horse
script kiddie
CAPTCHA
virus signature

Answer: virus signature

 

Question: A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?

Answer Options:

USA Patriot Act
Mobile Alliance Policy (MAP)
CAPTCHA
Bring your own device (BYOD)

Answer: Bring your own device (BYOD)

 

Question: Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?

Answer Options:

SANS Institute
Department of Homeland Security
US-CERT
IEEE

Answer: SANS Institute

 

Question: In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

Answer Options:

patch
exploit
firewall
security audit

Answer: exploit

 

Question: The most common computer security precaution taken by businesses is the installation of which of the following?

Answer Options:

rootkit
emergency response team
virtual private network
firewall

Answer: firewall

 

Question: Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?

Answer Options:

Health Insurance Portability and Accountability
Gramm-Leach-Bliley Act
USA PATRIOT Act
Fair Credit Reporting Act

Answer: Gramm-Leach-Bliley Act