Reference no: EM132815024
Question 1:
Information security is especially important to small businesses. This effectively means that large organizations that have greater resources and can survive in cases of problems do not need to have security.
Select one:
True
False
Question 2:
Which of the following defines Unified Threat Management Systems?
a.combination into a single and manageable system that includes firewalls, virtual private networks, intrusion detection systems, and Web content filtering and antispam software.
b.a full-time monitoring tools placed at the most vulnerable points or "hot spots" of corporate networks to detect and deter intruders continually.
c.a network security system that is designed to monitor and control incoming and outgoing Internet network traffic.
d.prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware.
Question 3:
This is a network security system that is designed to monitor and control incoming and outgoing Internet network traffic, filtering unsafe or suspected information that request to access the intranet from the Internet and other networks.
a.Unified Threat Management Systems
b.Intrusion Detection Systems
c.Antivirus and Antispyware Software
d.firewall
Question 4: Why do you think all wireless networks are vulnerable than wired networks?
a.wired networks cannot be stolen
b.wired networks can be scanned easily
c.radio frequency bands have vulnerabilities
d.radio frequency bands can be scanned easily
Question 5:
This type of security involves using special mathematical algorithms, or keys, to transform digital data into a scrambled code before they are transmitted, and then to decode the data when they are received.
a.Public key
b.Encryption
c.Public and private keys
d.Private key
Question 6:
Large electronic data are less vulnerable than manually stored data.
Select one:
True
False
Question 7: In contemporary times, the vulnerability of organizational information resources can be traced to these key factors:
a.Large electronic data
b.Smaller, faster, cheaper computers and storage devices
c.Highly interconnected, interdependent, wirelessly networked business environment
d.Increasing skills necessary to be a computer hacker
e.decreasing skills necessary to be a computer hacker
f.Lack of management support
Question 8:
Information technology security breaches costs an organization millions of dollars. Identify any two (2) direct costs of a data breach to an organization.
a.loss of business from increased customer turnover
b.hotlines to field queries from concerned or affected customers
c.offering free credit monitoring
d.setting up telephone
e.decreases in customer trust
f.notifying customers
g.include hiring forensic experts
h.providing discounts for future products and services
Question 9:
Identify two (2) intangible costs of a security breach to an organisation
a.offering free credit monitoring
b.loss of business from increased customer turnover
c.include hiring forensic experts
d.notifying customers
e.decreases in customer trust
f.setting up telephone
g.providing discounts for future products and services
h.hotlines to field queries from concerned or affected customers
Question 10:
Why do corporate entities tend to be more vulnerable when they become part of the internet?
a.its information systems are open to all the vulnerabilities of the internet
b.its management do not take sound decisions
c.its internal security is weakened
d.its protocols are at variance with those of the internet
Question 11:
Identity theft techniques used to illegally obtain personal information include all the following. Identify the correct ones.
a.stealing mail or dumpster diving;
b.social engineering
c.virtual monitoring
d.impersonating a trusted organization in an electronic communication (phishing).
e.stealing personal information in computer databases;
f.infiltrating organizations that store large amounts of personal information;
Question 12:
Which of the following stakeholders causes many of the data breaches or are the weak links in information security?
a.janitorial staff
b.partners
c.employee negligence
d.customers
Question 13: The most common threats against contemporary information systems can arise from factors include three main ones, identify them
a.interconnectivity
b.personal
c.environmental
d.technical
e.organizational
Question 14:
All the practices, processes and activities put in place to prevent unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information is referred to as
a.security
b.information security
c.computer security
d.data security
Question 15:
The degree of protection against criminal activity, danger, damage, and/or loss is termed as
a.security
b.data security
c.computer security
d.information security
Question 16: Bluetooth and Wi-Fi networks are especially susceptible to hacking by eavesdroppers using these tools. Identify all the tools they need.
a.801.11 standard
b.wireless cards
c.RFID
d.external antennae
e.hacking software
f.Laptops
Question 17:
The loss of business from increased customer turnover is also known as
a.decreases in customer trust
b.customer stress out
c.customer melee
d.customer churn