Deck 12: Information Security Management

Full screen (f)
exit full mode
Question
Natural disasters present the largest risk for infrastructure loss.
Use Space or
up arrow
down arrow
to flip the card.
Question
An intrusion detection system (IDS)is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Question
Email spoofing is a synonym for phishing.
Question
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
Question
As per the study conducted by Verizon, organizations that have been phished have increased to 40 percent since 2007.
Question
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
Question
In a study conducted by Verizon, in a year only about a hundred thousand people become victims of computer crimes.
Question
In a study conducted by Verizon, data theft has been most successful at large scale enterprises.
Question
Most emails and IMs are protected by encryption.
Question
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
Question
In a study conducted by Verizon, in 2011, the four most frequent computer crimes involved criminal activity against servers.
Question
Unauthorized data disclosures are possible due to human error.
Question
Cookies enable an individual to access Web sites without having to sign in every time.
Question
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
Question
A computer crime is committed if an employee who inadvertently installs an old database on top of the current one.
Question
Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.
Question
Pretexting occurs when a person receives a confidential text message by mistake and pretends to be the intended recipient.
Question
Phishing is a technique for intercepting computer communications.
Question
Drive-by sniffers monitor and intercept wireless traffic at will.
Question
In context of information security, safeguards increase work efficiency by making common tasks easier.
Question
It is safer to use the same password for all the Web sites.
Question
Most spyware programs are benign in that they do not perform malicious acts or steal data.
Question
Symmetric encryption is simpler and much faster than asymmetric encryption.
Question
Viruses and worms are examples of malware.
Question
Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.
Question
Encryption is an example of a technical safeguard.
Question
A magnetic strip holds far more data than a microchip.
Question
A Trojan horse is a virus that masquerades as a useful program or file.
Question
Security policies must not depend on whether the organization is governmental or nongovernmental,
or whether it is publically held or private.
Question
Brute force requires only 2 days to crack a password having a mixture of upper and lowercase letters, numbers, and special characters.
Question
Even short passwords with no special characters can make strong passwords.
Question
Technical safeguards involve the hardware and software components of an information system.
Question
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
Question
A new hire must seek out the employer's security policy if it is not discussed in new employee training.
Question
In symmetric encryption, two different keys are used to encode and decode a message.
Question
Secure Socket Layer (SSL)is a protocol that is restricted to asymmetric encryption.
Question
Biometric authentication uses characteristics such as retinal scans.
Question
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
Question
Data safeguards are measures used to protect computer hardware from external threat.
Question
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
Question
Hardening is actually a human safeguard.
Question
Which of the following is considered a threat caused by human error?

A)An employee inadvertently installs an old database on top of the current one.
B)An employee intentionally destroys data and system components.
C)A virus and worm writer infects computer systems.
D)A hacker breaks into a system to steal for financial gain.
Question
A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.

A)target
B)vulnerability
C)threat
D)warning
Question
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A)hacker
B)phisher
C)safeguard
D)sniffer
Question
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

A)unauthorized data disclosure
B)incorrect data modification
C)faulty services
D)loss of infrastructure
Question
________ occurs when someone deceives by pretending to be someone else.

A)Hacking
B)Baiting
C)Sniffing
D)Pretexting
Question
Companies should require vendors and partners to perform appropriate screening and security training.
Question
Which of the following is an example of a sniffing technique?

A)IP spoofing
B)caches
C)ad blockers
D)adware
Question
The existence of accounts that are no longer in use are not a security threat to an organization.
Question
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

A)Drive-by spoofers
B)Pretexters
C)Drive-by sniffers
D)Phishers
Question
If a backup of the database contents is made, the database is protected.
Question
Which of the following is considered a computer crime?

A)internal software bug deleting customer records
B)poorly written programs resulting in data losses
C)loss of data as a result of flooding
D)hacking of information systems
Question
If the incident-response plan is not well prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
Question
Email spoofing is a synonym for ________.

A)hacking
B)phishing
C)usurping
D)sniffing
Question
Business requirements do not necessitate opening information systems to nonemployee personnel-temporary personnel, vendors or partner personnel.
Question
It is easy and economical to hold public users of Web sites accountable for security violations.
Question
Employee termination is a potential security threat for an organization.
Question
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
Question
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
Question
________ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.

A)Spoofing
B)Phishing
C)Sniffing
D)Pretexting
Question
Which of the following is a critical security function of senior management in an organization?

A)safeguarding computer hardware and software
B)developing IS security software
C)establishing the security policy and managing risk
D)managing security programs on a real-time basis
Question
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

A)Privacy Act of 1974
B)Sarbanes-Oxley Act
C)HIPAA of 1996
D)Gramm-Leach-Bliley Act
Question
Nonword passwords are vulnerable to a(n)________ attack, in which the password cracker tries every possible combination of characters.

A)denial-of-service
B)side channel
C)brute force
D)obfuscation
Question
________ present the largest risk for an organization's infrastructure loss.

A)Employees
B)Natural disasters
C)Hackers
D)Competitors
Question
Which of the following usually happens in a malicious denial-of-service attack?

A)A hacker monitors and intercepts wireless traffic at will.
B)A hacker floods a Web server with millions of bogus service requests.
C)A hacker uses another site's IP address to masquerade as that other site.
D)A phisher pretends to be a legitimate company and requests confidential data.
Question
A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

A)IDS
B)botnet
C)antivirus
D)firewall
Question
Which of the following is most likely to be the result of hacking?

A)certain Web sites being blocked from viewing for security reasons
B)small amounts of spam in your inbox
C)an unexplained reduction in your account balance
D)pop-up ads appearing frequently
Question
________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.

A)Cookies
B)Registers
C)Pop-ups
D)Public keys
Question
Which of the following is an example of a technical safeguard?

A)position definitions
B)firewalls
C)key escrow
D)locked down servers
Question
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

A)Unauthorized data disclosure
B)Incorrect data modification
C)Denial of service
D)Loss of infrastructure
Question
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal and manipulate data, or other purposes.

A)Hacking
B)Spoofing
C)Phishing
D)Usurpation
Question
A ________ is a number used to encrypt the data.

A)key
B)WPA
C)pretext
D)WEP
Question
________ enable you to access Web sites without having to sign in every time.

A)Bookmarks
B)Pop-ups
C)Cookies
D)Public keys
Question
Users of smart cards are required to enter a ________ to be authenticated.

A)Social Security number
B)public key
C)personal identification number
D)private key
Question
A(n)________ has a microchip in it to hold data.

A)ATM card
B)smart card
C)cookie
D)escrow
Question
Which of the following is used for biometric authentication?

A)smart cards
B)facial features
C)passwords
D)personal identification numbers
Question
In asymmetric encryption, each site has a ________ for encoding messages.

A)wireless fidelity
B)private key
C)public key
D)pretext
Question
Which of the following statements is true of biometric identification?

A)It involves the use of a PIN for authentication.
B)It provides weak authentication.
C)It is a relatively inexpensive mode of authentication.
D)It often faces resistance from users for its invasive nature.
Question
The Privacy Act of 1974 provides protection to individuals regarding ________.

A)records held by private companies
B)records held by the U.S.government
C)records held by banks and other financial institutions
D)records held by non-government agencies
Question
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

A)Pretexting
B)Phishing
C)Hacking
D)Spoofing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/123
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Information Security Management
1
Natural disasters present the largest risk for infrastructure loss.
True
2
An intrusion detection system (IDS)is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
True
3
Email spoofing is a synonym for phishing.
True
4
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
5
As per the study conducted by Verizon, organizations that have been phished have increased to 40 percent since 2007.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
6
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
7
In a study conducted by Verizon, in a year only about a hundred thousand people become victims of computer crimes.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
8
In a study conducted by Verizon, data theft has been most successful at large scale enterprises.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
9
Most emails and IMs are protected by encryption.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
10
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
11
In a study conducted by Verizon, in 2011, the four most frequent computer crimes involved criminal activity against servers.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
12
Unauthorized data disclosures are possible due to human error.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
13
Cookies enable an individual to access Web sites without having to sign in every time.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
14
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
15
A computer crime is committed if an employee who inadvertently installs an old database on top of the current one.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
16
Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
17
Pretexting occurs when a person receives a confidential text message by mistake and pretends to be the intended recipient.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
18
Phishing is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
19
Drive-by sniffers monitor and intercept wireless traffic at will.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
20
In context of information security, safeguards increase work efficiency by making common tasks easier.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
21
It is safer to use the same password for all the Web sites.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
22
Most spyware programs are benign in that they do not perform malicious acts or steal data.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
23
Symmetric encryption is simpler and much faster than asymmetric encryption.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
24
Viruses and worms are examples of malware.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
25
Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
26
Encryption is an example of a technical safeguard.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
27
A magnetic strip holds far more data than a microchip.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
28
A Trojan horse is a virus that masquerades as a useful program or file.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
29
Security policies must not depend on whether the organization is governmental or nongovernmental,
or whether it is publically held or private.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
30
Brute force requires only 2 days to crack a password having a mixture of upper and lowercase letters, numbers, and special characters.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
31
Even short passwords with no special characters can make strong passwords.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
32
Technical safeguards involve the hardware and software components of an information system.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
33
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
34
A new hire must seek out the employer's security policy if it is not discussed in new employee training.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
35
In symmetric encryption, two different keys are used to encode and decode a message.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
36
Secure Socket Layer (SSL)is a protocol that is restricted to asymmetric encryption.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
37
Biometric authentication uses characteristics such as retinal scans.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
38
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
39
Data safeguards are measures used to protect computer hardware from external threat.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
40
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
41
Hardening is actually a human safeguard.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is considered a threat caused by human error?

A)An employee inadvertently installs an old database on top of the current one.
B)An employee intentionally destroys data and system components.
C)A virus and worm writer infects computer systems.
D)A hacker breaks into a system to steal for financial gain.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
43
A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.

A)target
B)vulnerability
C)threat
D)warning
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
44
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

A)hacker
B)phisher
C)safeguard
D)sniffer
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
45
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

A)unauthorized data disclosure
B)incorrect data modification
C)faulty services
D)loss of infrastructure
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
46
________ occurs when someone deceives by pretending to be someone else.

A)Hacking
B)Baiting
C)Sniffing
D)Pretexting
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
47
Companies should require vendors and partners to perform appropriate screening and security training.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is an example of a sniffing technique?

A)IP spoofing
B)caches
C)ad blockers
D)adware
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
49
The existence of accounts that are no longer in use are not a security threat to an organization.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
50
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

A)Drive-by spoofers
B)Pretexters
C)Drive-by sniffers
D)Phishers
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
51
If a backup of the database contents is made, the database is protected.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is considered a computer crime?

A)internal software bug deleting customer records
B)poorly written programs resulting in data losses
C)loss of data as a result of flooding
D)hacking of information systems
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
53
If the incident-response plan is not well prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
54
Email spoofing is a synonym for ________.

A)hacking
B)phishing
C)usurping
D)sniffing
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
55
Business requirements do not necessitate opening information systems to nonemployee personnel-temporary personnel, vendors or partner personnel.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
56
It is easy and economical to hold public users of Web sites accountable for security violations.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
57
Employee termination is a potential security threat for an organization.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
58
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
59
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
60
________ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.

A)Spoofing
B)Phishing
C)Sniffing
D)Pretexting
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is a critical security function of senior management in an organization?

A)safeguarding computer hardware and software
B)developing IS security software
C)establishing the security policy and managing risk
D)managing security programs on a real-time basis
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

A)Privacy Act of 1974
B)Sarbanes-Oxley Act
C)HIPAA of 1996
D)Gramm-Leach-Bliley Act
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
63
Nonword passwords are vulnerable to a(n)________ attack, in which the password cracker tries every possible combination of characters.

A)denial-of-service
B)side channel
C)brute force
D)obfuscation
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
64
________ present the largest risk for an organization's infrastructure loss.

A)Employees
B)Natural disasters
C)Hackers
D)Competitors
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following usually happens in a malicious denial-of-service attack?

A)A hacker monitors and intercepts wireless traffic at will.
B)A hacker floods a Web server with millions of bogus service requests.
C)A hacker uses another site's IP address to masquerade as that other site.
D)A phisher pretends to be a legitimate company and requests confidential data.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

A)IDS
B)botnet
C)antivirus
D)firewall
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is most likely to be the result of hacking?

A)certain Web sites being blocked from viewing for security reasons
B)small amounts of spam in your inbox
C)an unexplained reduction in your account balance
D)pop-up ads appearing frequently
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
68
________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.

A)Cookies
B)Registers
C)Pop-ups
D)Public keys
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is an example of a technical safeguard?

A)position definitions
B)firewalls
C)key escrow
D)locked down servers
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
70
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

A)Unauthorized data disclosure
B)Incorrect data modification
C)Denial of service
D)Loss of infrastructure
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
71
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal and manipulate data, or other purposes.

A)Hacking
B)Spoofing
C)Phishing
D)Usurpation
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
72
A ________ is a number used to encrypt the data.

A)key
B)WPA
C)pretext
D)WEP
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
73
________ enable you to access Web sites without having to sign in every time.

A)Bookmarks
B)Pop-ups
C)Cookies
D)Public keys
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
74
Users of smart cards are required to enter a ________ to be authenticated.

A)Social Security number
B)public key
C)personal identification number
D)private key
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
75
A(n)________ has a microchip in it to hold data.

A)ATM card
B)smart card
C)cookie
D)escrow
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is used for biometric authentication?

A)smart cards
B)facial features
C)passwords
D)personal identification numbers
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
77
In asymmetric encryption, each site has a ________ for encoding messages.

A)wireless fidelity
B)private key
C)public key
D)pretext
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following statements is true of biometric identification?

A)It involves the use of a PIN for authentication.
B)It provides weak authentication.
C)It is a relatively inexpensive mode of authentication.
D)It often faces resistance from users for its invasive nature.
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
79
The Privacy Act of 1974 provides protection to individuals regarding ________.

A)records held by private companies
B)records held by the U.S.government
C)records held by banks and other financial institutions
D)records held by non-government agencies
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
80
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

A)Pretexting
B)Phishing
C)Hacking
D)Spoofing
Unlock Deck
Unlock for access to all 123 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 123 flashcards in this deck.