-
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
-
Which of the following is an opportunity for threats to gain access to assets?
Vulnerability
-
A(n) _______________ is a program that seems like a normal program, but does something completely unexpected.
Trojan horse
-
A __________ is a unique type of malware that replicates itself from one computer to another.
worm
-
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
keylogger
-
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
cybervandalism
-
Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack.
denial-of-service
-
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing
-
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
-
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
click fraud
-
The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000.
ILOVEYOU
-
_______________ requires that your patient records be protected and saved for six years.
HIPAA
-
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Bliley Act
-
Which law provides rules related to the creation of financial statements to help avoid fraud?
Sarbanes-Oxley Act
-
Establishing a risk level of malware threats to an organization is an example of _______________.
risk assessment
-
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
social engineering
-
Electronic evidence on computer storage media that is not visible to the average user is called ________.
ambient data
-
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
-
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
-
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication.
biometric
-
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
-
Which of the following examines data files and sorts out low-priority online material while assigning higher priority to business-critical files?
Deep packet inspections
-
Which statement about public key encryption is FALSE?
On receiving the message, the recipient uses the public key to decrypt it.
-
Which statement about digital certificates is FALSE?
The CA verifies a digital certificate user's identity online.
-
Which of the following is NOT a security threat posed by the use of the iPhone, iPad, and other mobile computing devices in the workplace?
Mobile devices may dictate what kind of data an app can access inside its sandbox domain.
|
|