BUS 349 Week 6 Quiz | Assignment Help | Mercer University
- Mercer University / BUS 349
- 25 Feb 2021
- Price: $5
- Other / Other
BUS 349 Week 6 Quiz | Assignment Help | Mercer University
Week 6 Content Review
Quiz
Question 1
Most computer viruses
deliver a:
o
worm.
o
drive by download.
o
keylogger.
o
payload.
o
Trojan horse.
Question 2
Using numerous
computers to inundate and overwhelm a network site (sometimes from numerous
launch sites) is called a(n) _________ attack.
o
botnet
o
ransom ware
o
trojan horse
o
SQL injection
o
DoS - denial of service
Question 3
Which of the following
is the single greatest cause of network security breaches?
o
Bugs
o
Cyber warfare.
o
Worms
o
User lack of knowledge
o
Viruses
Question 4
Wireless networks are
more difficult for hackers to gain access to because radio frequency bands are
difficult to scan.
o
True
o
False
Question 5
The HIPAA Act of 1996:
o
Outlines medical security and privacy
rules.
o
Identifies computer abuse as a crime and
defines abusive activities.
o
imposes responsibility on companies and
management to safeguard the accuracy of financial information.
o
requires financial institutions to to
ensure the security of customer data.
o
specifies best practices in information
systems security and control.
Question 6
A statement ranking the
information risks of an organization and identifying security goals would be
included in which of the following?
o
Disaster recovery plan
o
Business impact analysis
o
Security policy
o
Business continuity plan
o
AUP - Acceptable use policy
Question 7
All of the following
are currently being used as traits that can be profiled by biometric
authentication except:
o
body odor.
o
fingerprints.
o
retinal images.
o
facial characteristics.
o
voice.
Question 8
_________ use scanning
software to look for known problems such as bad passwords, the removal of
important files, security attacks in progress, and system administration
errors.
o
Stateful inspections
o
Packet filtering technologies
o
Application proxy filtering technologies
o
Intrusion detection systems
o
Firewalls
Question 9
Fault tolerant
information systems offer 100 percent availability because they use:
o
high capacity storage.
o
a multitier server network.
o
a digital certificate system.
o
dedicated phone lines.
o
redundant hardware, software, and power
supplies.
Question 10
SSL is a protocol used
to establish a secure connection between two computers.
o
True
o
False