BUS 350 Week 6 Quiz | Mercer University
- Mercer University / BUS 350
- 21 Mar 2022
- Price: $5
- Management Assignment Help / Business Management Assignment Help
BUS 350 Week 6 Quiz | Mercer University
Question 1
Most computer viruses deliver a:
· worm.
· drive by download.
· keylogger.
· payload.
· Trojan horse.
Question 2
Using numerous computers to inundate and overwhelm a network site (sometimes from numerous launch sites) is called a(n) _________ attack.
· botnet
· ransomware
· trojan horse
· SQL injection
· DoS - denial of service
Question 3
Which of the following is the single greatest cause of network security breaches?
· Bugs
· Cyberwarfare.
· Worms
· User lack of knowledge
· Viruses
Question 4
Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.
· True
· False
Question 5
The HIPAA Act of 1996:
· outlines medical security and privacy rules.
· identifies computer abuse as a crime and defines abusive activities.
· imposes responsibility on companies and management to safeguard the accuracy of financial information.
· requires financial institutions to to ensure the security of customer data.
· specifies best practices in information systems security and control.
Question 6
A statement ranking the information risks of an organization and identifying security goals would be included in which of the following?
· Disaster recovery plan
· Business impact analysis
· Security policy
· Business continuity plan
· AUP - Acceptable use policy
Question 7
All of the following are currently being used as traits that can be profiled by biometric authentication except:
· body odor.
· fingerprints.
· retinal images.
· facial characteristics.
· voice.
Question 8
_________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
Stateful inspections
· Packet filtering technologies
· Application proxy filtering technologies
· Intrusion detection systems
· Firewalls
Question 9
Fault tolerant information systems offer 100 percent availability because they use:
· high capacity storage.
· a multitier server network.
· a digital certificate system.
· dedicated phone lines.
· redundant hardware, software, and power supplies.
Question 10
SSL is a protocol used to establish a secure connection between two computers.
· True
· False