BUS 350 Week 6 Quiz | Mercer University

BUS 350 Week 6 Quiz | Mercer University 

Question 1

Most computer viruses deliver a:  

·         worm. 

·         drive by download.  

·         keylogger.    

·         payload.    

·         Trojan horse.

 

 Question 2

Using numerous computers to inundate and overwhelm a network site (sometimes from numerous launch sites) is called a(n) _________ attack.    

·         botnet  

·         ransomware  

·         trojan horse  

·         SQL injection  

·         DoS - denial of service

 

 Question 3

Which of the following is the single greatest cause of network security breaches?  

·         Bugs  

·         Cyberwarfare. 

·         Worms  

·         User lack of knowledge    

·         Viruses

 

 Question 4

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.  

·         True    

·         False

 

Question 5

The HIPAA Act of 1996:  

·         outlines medical security and privacy rules.    

·         identifies computer abuse as a crime and defines abusive activities.  

·         imposes responsibility on companies and management to safeguard the accuracy of financial information.  

·         requires financial institutions to to ensure the security of customer data.  

·         specifies best practices in information systems security and control.

 

 Question 6

A statement ranking the information risks of an organization and identifying security goals would be included in which of the following?  

·         Disaster recovery plan  

·         Business impact analysis 

·         Security policy 

·         Business continuity plan  

·         AUP - Acceptable use policy

 

 Question 7

All of the following are currently being used as traits that can be profiled by biometric authentication except:  

·         body odor.   

·         fingerprints.  

·         retinal images. 

·         facial characteristics. 

·         voice.

 

 Question 8

_________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.  

Stateful inspections  

·         Packet filtering technologies 

·         Application proxy filtering technologies

·         Intrusion detection systems  

·         Firewalls

 

 

Question 9

Fault tolerant information systems offer 100 percent availability because they use:  

·         high capacity storage.  

·         a multitier server network.  

·         a digital certificate system.  

·         dedicated phone lines.    

·         redundant hardware, software, and power supplies.

 

 Question 10

SSL is a protocol used to establish a secure connection between two computers.  

·         True  

·         False

 

Answer Detail

Get This Answer

Invite Tutor