Question Question 1  The macro virus infects the key operating system files located in a computer’s start up sector. Question 1 options: True False Save Question 2  Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? Question 2 options: Projects Policy Protection People Save Question 3  Which of the following is NOT a primary function of Information Security Management? Question 3 options: Projects Performance Planning Protection Save Question 4  According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? Question 4 options: Authentication Authorization Availability Accountability Save Question 5  Which of the following is NOT a step in the problem-solving process? Question 5 options: Gather facts and make assumptions Select, implement and evaluate a solution Analyze and compare possible solutions Build support among management for the candidate solution Save Question 6  A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. Question 6 options: True False Save Question 7  "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. Question 7 options: True False Save Question 8  As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________. Question 8 options: hoaxes polymorphisms false alarms urban legends Save Question 9  The first step in solving problems is to gather facts and make assumptions. Question 9 options: True False Save Question 10  Blackmail threat of informational disclosure is an example of which threat category? Question 10 options: Compromises of intellectual property Espionage or trespass Information extortion Sabotage or vandalism Save Question 11  Which of the following is the best example of a rapid-onset disaster? Question 11 options: Famine Environmental degradation Flood Pest infestation Save Question 12  Which type of document grants formal permission for an investigation to occur? Question 12 options: Forensic concurrence Affidavit Evidentiary report Search warrant Save Question 13  In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Question

Question 1 

The macro virus infects the key operating system files located in a computer’s start up sector.

Question 1 options:

True

False

Save

Question 2 

Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?

Question 2 options:

Projects

Policy

Protection

People

Save

Question 3 

Which of the following is NOT a primary function of Information Security Management?

Question 3 options:

Projects

Performance

Planning

Protection

Save

Question 4 

According to the C.I.A. triad, which of the following is a desirable characteristic for computer security?

Question 4 options:

Authentication

Authorization

Availability

Accountability

Save

Question 5 

Which of the following is NOT a step in the problem-solving process?

Question 5 options:

Gather facts and make assumptions

Select, implement and evaluate a solution

Analyze and compare possible solutions

Build support among management for the candidate solution

Save

Question 6 

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

Question 6 options:

True

False

Save

Question 7 

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance.

Question 7 options:

True

False

Save

Question 8 

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________.

Question 8 options:

hoaxes

polymorphisms

false alarms

urban legends

Save

Question 9 

The first step in solving problems is to gather facts and make assumptions.

Question 9 options:

True

False

Save

Question 10 

Blackmail threat of informational disclosure is an example of which threat category?

Question 10 options:

Compromises of intellectual property

Espionage or trespass

Information extortion

Sabotage or vandalism

Save

Question 11 

Which of the following is the best example of a rapid-onset disaster?

Question 11 options:

Famine

Environmental degradation

Flood

Pest infestation

Save

Question 12 

Which type of document grants formal permission for an investigation to occur?

Question 12 options:

Forensic concurrence

Affidavit

Evidentiary report

Search warrant

Save

Question 13 

In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?

 

 

 

 

 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY