Question Question 1 The macro virus infects the key operating system files located in a computer’s start up sector. Question 1 options: True False Save Question 2 Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? Question 2 options: Projects Policy Protection People Save Question 3 Which of the following is NOT a primary function of Information Security Management? Question 3 options: Projects Performance Planning Protection Save Question 4 According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? Question 4 options: Authentication Authorization Availability Accountability Save Question 5 Which of the following is NOT a step in the problem-solving process? Question 5 options: Gather facts and make assumptions Select, implement and evaluate a solution Analyze and compare possible solutions Build support among management for the candidate solution Save Question 6 A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. Question 6 options: True False Save Question 7 "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. Question 7 options: True False Save Question 8 As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________. Question 8 options: hoaxes polymorphisms false alarms urban legends Save Question 9 The first step in solving problems is to gather facts and make assumptions. Question 9 options: True False Save Question 10 Blackmail threat of informational disclosure is an example of which threat category? Question 10 options: Compromises of intellectual property Espionage or trespass Information extortion Sabotage or vandalism Save Question 11 Which of the following is the best example of a rapid-onset disaster? Question 11 options: Famine Environmental degradation Flood Pest infestation Save Question 12 Which type of document grants formal permission for an investigation to occur? Question 12 options: Forensic concurrence Affidavit Evidentiary report Search warrant Save Question 13 In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?
Question
Question 1
The macro virus infects the key
Question 1 options:
True
False
Save
Question 2
Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?
Question 2 options:
Projects
Policy
Protection
People
Save
Question 3
Which of the following is NOT a primary function of
Question 3 options:
Projects
Performance
Planning
Protection
Save
Question 4
According to the C.I.A. triad, which of the following is a desirable characteristic for computer security?
Question 4 options:
Authentication
Authorization
Availability
Accountability
Save
Question 5
Which of the following is NOT a step in the problem-solving process?
Question 5 options:
Gather facts and make assumptions
Select, implement and evaluate a solution
Analyze and compare possible solutions
Build support among management for the candidate solution
Save
Question 6
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
Question 6 options:
True
False
Save
Question 7
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance.
Question 7 options:
True
False
Save
Question 8
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________.
Question 8 options:
hoaxes
polymorphisms
false alarms
urban legends
Save
Question 9
The first step in solving problems is to gather facts and make assumptions.
Question 9 options:
True
False
Save
Question 10
Blackmail threat of informational disclosure is an example of which threat category?
Question 10 options:
Compromises of intellectual property
Espionage or trespass
Information extortion
Sabotage or vandalism
Save
Question 11
Which of the following is the best example of a rapid-onset disaster?
Question 11 options:
Famine
Environmental degradation
Flood
Pest infestation
Save
Question 12
Which type of document grants formal permission for an investigation to occur?
Question 12 options:
Forensic concurrence
Affidavit
Evidentiary report
Search warrant
Save
Question 13
In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?
Trending now
This is a popular solution!
Step by step
Solved in 2 steps