BUS 349 Week 6 Quiz | Assignment Help | Mercer University

BUS 349 Week 6 Quiz | Assignment Help | Mercer University


Week 6 Content Review Quiz

 

Question 1

Most computer viruses deliver a:

 

o   worm.

o   drive by download.

o   keylogger.

o   payload.

o   Trojan horse.

 

 

Question 2

Using numerous computers to inundate and overwhelm a network site (sometimes from numerous launch sites) is called a(n) _________ attack.

 

o   botnet

o   ransom ware

o   trojan horse

o   SQL injection

o   DoS - denial of service

 

 

 

Question 3

Which of the following is the single greatest cause of network security breaches?

 

o   Bugs

o   Cyber warfare.

o   Worms

o   User lack of knowledge

o   Viruses

 

 

Question 4

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

 

o   True

o   False

 

 

Question 5

The HIPAA Act of 1996:

 

o   Outlines medical security and privacy rules.

o   Identifies computer abuse as a crime and defines abusive activities.

o   imposes responsibility on companies and management to safeguard the accuracy of financial information.

o   requires financial institutions to to ensure the security of customer data.

o   specifies best practices in information systems security and control.

 

 

Question 6

A statement ranking the information risks of an organization and identifying security goals would be included in which of the following?

 

o   Disaster recovery plan

o   Business impact analysis

o   Security policy

o   Business continuity plan

o   AUP - Acceptable use policy

 

 

Question 7

 

All of the following are currently being used as traits that can be profiled by biometric authentication except:

 

o   body odor.

o   fingerprints.

o   retinal images.

o   facial characteristics.

o   voice.

 

 

Question 8

_________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

 

o   Stateful inspections

o   Packet filtering technologies

o   Application proxy filtering technologies

o   Intrusion detection systems

o   Firewalls

 

 

Question 9

Fault tolerant information systems offer 100 percent availability because they use:

 

o   high capacity storage.

o   a multitier server network.

o   a digital certificate system.

o   dedicated phone lines.

o   redundant hardware, software, and power supplies.

 

 Question 10

SSL is a protocol used to establish a secure connection between two computers.

 

o   True

o   False

 

 

 

Answer Detail

Get This Answer

Invite Tutor