 |
1 |  |  Three security aspects affect all businesses, but particularly those engaged in e-commerce: |
|  | A) | Employee trustworthiness, unethical business partners, interception of messages. |
|  | B) | Attacks on servers, firewall breakdowns, outdated encryption programs. |
|  | C) | Interception of messages, attacks on servers, monitoring to identify attacks. |
|  | D) | Failure to make frequent backups, interception of messages, employee errors. |
 |
 |
2 |  |  A computer virus that attaches itself to your e-mail and then gets loose within your computer tends to do two things: |
|  | A) | Wipe the hard drives clean and destroy the operating system. |
|  | B) | Release confidential files to hackers and destroy your e-mail contact list. |
|  | C) | Leave a time bomb or Trojan horse for future trouble. |
|  | D) | It attaches itself to other files in your computer, and it sends itself to everyone in your contact list using your name. |
 |
 |
3 |  |  Common techniques to identify a person based on biological characteristics that can be useful for computer security are: |
|  | A) | Fingerprints, handprints, retinal scanners. |
|  | B) | DNA scanners, tooth patterns, handprints. |
|  | C) | Voiceprints, DNA scanners, fingerprints. |
|  | D) | Retinal scanners, DNA scanners, photographs. |
 |
 |
4 |  |  For a fee, there are several websites too help smaller businesses: |
|  | A) | Check potential employee references. |
|  | B) | Check credit references before the companies agree to work with other small companies. |
|  | C) | Conduct merges on the Internet. |
|  | D) | Perform basic background checks to verify SSNs and check public criminal records. |
 |
 |
5 |  |  One problem for persons sending credit card numbers over the Internet is that: |
|  | A) | You don't know who is on the other end. |
|  | B) | Automated tools can be set to monitor transfers through one piece of the Internet, looking or card numbers. |
|  | C) | Security is not as good as ones hopes it might be. |
|  | D) | Internet transactions are not covered by credit card insurance. |
 |
 |
6 |  |  Any time you open a connection from the Internet to your company data: |
|  | A) | Re-check the firewall. |
|  | B) | Require a password from the outside connection. |
|  | C) | Record all interactions. |
|  | D) | Be very careful to maintain strict control of that interaction. |
 |
 |
7 |  |  A recent misuse of cookies was attempted by the company: |
|  | A) | Amazon.com |
|  | B) | Doubleclick.com |
|  | C) | Plug and Play.com |
|  | D) | Trackemnow.com |
 |
 |
8 |  |  Which of the following is a key aspect of security and encryption? |
|  | A) | Authenticating and identifying the user |
|  | B) | Monitoring systems to identify arracks |
|  | C) | Intercepting transmissions |
|  | D) | Preventing attacks on the server |
 |
 |
9 |  |  How has the internet and e-commerce added challenges for security? |
|  | A) | Increased amounts of employees add the amount of exposure to corporate data. |
|  | B) | More websites utilize corporate data like inventory levels. |
|  | C) | Today’s huge computer capacity has the higher potential for outside attacks by hackers. |
|  | D) | It is increasingly more difficult to authenticate transmission of corporate data. |
 |
 |
10 |  |  What poses the biggest threat to information systems? |
|  | A) | Hackers |
|  | B) | Hurricanes |
|  | C) | Developers |
|  | D) | Inadequate backup systems |
 |
 |
11 |  |  Which option is not a part of a disaster recovery service? |
|  | A) | Data mirroring |
|  | B) | Backup power generators |
|  | C) | Hot centers |
|  | D) | Cold centers |
 |
 |
12 |  |  Identifying and preventing unscrupulous MIS employees from attacking or stealing is a complicated task. The only viable solution is to: |
|  | A) | Run extensive background checks. |
|  | B) | Check for “fire bombs” in software code on a regular basis. |
|  | C) | Have backups of data readily available. |
|  | D) | Don’t trust your programmers and analysts. |
 |
 |
13 |  |  It’s generally a good practice to separate staff programmers and users because: |
|  | A) | It prevents the opportunity for data theft. |
|  | B) | There’s no transaction processing auditing otherwise. |
|  | C) | It prevents the creation of timebombs in software. |
|  | D) | Programmers and users have a conflict of interests. |
 |
 |
14 |  |  Unscrupulous and criminal programmers have various ways of sabotaging software for their gain. Which of the following is not a method? |
|  | A) | UCITA |
|  | B) | Tospdoors |
|  | C) | Time Bombs |
|  | D) | Secret passwords |
 |
 |
15 |  |  The electronic interexchange of financial and business data between businesses is identified as: |
|  | A) | ASP |
|  | B) | UCITA |
|  | C) | EDI |
|  | D) | MIS |
 |
 |
16 |  |  The acronym ASP stands for: |
|  | A) | Application Scripts Protocol. |
|  | B) | Action Scripted pages. |
|  | C) | Active Server Page. |
|  | D) | Application Service Provider. |
 |
 |
17 |  |  There are many advantages of using an ASP. Which of the following is not one of them? |
|  | A) | Availability of company data on the Internet. |
|  | B) | Export advice and maintenance of data. |
|  | C) | Options of scalability. |
|  | D) | Security of having all company maintenance by an outside party. |
 |
 |
18 |  |  Outside hackers have invented many methods to gain access to company data. Which method involves scanning software searching for holes in security and software? |
|  | A) | Time bombs |
|  | B) | Trap doors |
|  | C) | Script kiddies |
|  | D) | Social engineers |
 |
 |
19 |  |  Which Microsoft programming language offers a potential for stolen data? |
|  | A) | C++ |
|  | B) | Java |
|  | C) | Visual Basic |
|  | D) | Visual Age |
 |
 |
20 |  |  The most prevalent way of acquiring a computer virus is: |
|  | A) | Email attachments. |
|  | B) | Macro programs. |
|  | C) | Trojans. |
|  | D) | Worms. |
 |
 |
21 |  |  There are many ways to prevent the download of worms onto your computer. |
|  | A) | Avoid suspect email attachments. |
|  | B) | Use a virus software kit. |
|  | C) | Utilize email filters. |
|  | D) | Avoid using software from the Internet. |
 |
 |
22 |  |  When a program replicates and embeds itself, and is usually is benign to the host computer, this is an example of a: |
|  | A) | Virus. |
|  | B) | Trojan. |
|  | C) | Script kiddy. |
|  | D) | Worm. |
 |
 |
23 |  |  Denial of service is often related to the problems of |
|  | A) | Unauthorized withholding |
|  | B) | Unauthorized disclosure |
|  | C) | Unauthorized modification |
|  | D) | Unauthorized access |
 |
 |
24 |  |  17. Which area of industry has led to the strongest developments in data security? |
|  | A) | banking |
|  | B) | healthcare |
|  | C) | military |
|  | D) | home/private security |
 |
 |
25 |  |  Probably the most effective means of protecting data is: |
|  | A) | An uninterruptible power supply. |
|  | B) | A trusted IT staff. |
|  | C) | firewalls and data encryption |
|  | D) | formal backups |
 |
 |
26 |  |  Which of the following is not part of an effective backup plan? |
|  | A) | An off site storage area |
|  | B) | Uninterruptible power supply |
|  | C) | Access controls to data |
|  | D) | Daily and weekly backup procedure |
 |
 |
27 |  |  Some general rules of good password does not include the following: |
|  | A) | Using a combination of letters and numbers |
|  | B) | Never writing down passwords |
|  | C) | Changing your password often |
|  | D) | Using words that are easy to remember |
 |
 |
28 |  |  Kerbers is an example of a: |
|  | A) | Biometric system used to identify fingerprints |
|  | B) | System cover used to authenticate other servers |
|  | C) | Password generator |
|  | D) | Transportable backup system. |
 |
 |
29 |  |  Other than cost, what seems to be the biggest impediment to using biometric systems? |
|  | A) | Possible bodily endangerment |
|  | B) | The unreliability of certain devises |
|  | C) | The lack of standards |
|  | D) | The lack of industry knowledge and acceptance |
 |
 |
30 |  |  Audits are an effective way of preventing fraud, but they do have drawbacks such as: |
|  | A) | Extra operational costs to a firm |
|  | B) | Inability of auditors to detect all fraud |
|  | C) | Lack of auditory standards among auditing organizations |
|  | D) | Threat of being audited not great enough to thwart fraud |
 |
 |
31 |  |  Steganography can be defined as: |
|  | A) | a type of shorthand used for note taking |
|  | B) | A teletype machine for encryption |
|  | C) | Hidden messages within communications |
|  | D) | a means of generating passwords |
 |
 |
32 |  |  Producing an audit trail of all file changes made is an example of what security measure? |
|  | A) | Hiring and employee evaluation |
|  | B) | Physical access tracking and prevention |
|  | C) | Access controls |
|  | D) | Data monitoring |
 |
 |
33 |  |  The concept of brute force attacks is associated with |
|  | A) | Encryption |
|  | B) | data monitoring |
|  | C) | Access controls |
|  | D) | Stegonography |
 |
 |
34 |  |  Which encryption standard allows for the choices of three key lengths? |
|  | A) | Triple DES |
|  | B) | DES 3.0 |
|  | C) | AES |
|  | D) | PKI |
 |
 |
35 |  |  When sending and receiving messages through dual key encryption, what is needed besides a public and private key? |
|  | A) | RSA |
|  | B) | PGP |
|  | C) | AES |
|  | D) | PKI |
 |
 |
36 |  |  Besides military applications, what's a more common use for dual encryption data? |
|  | A) | Secure email messaging |
|  | B) | Credit card processing |
|  | C) | Internet financial data processing |
|  | D) | Password authentication |
 |
 |
37 |  |  In order for digital signatures to work, digital certificates are needed for what reason? |
|  | A) | Internetaccess keys always work in pairs. |
|  | B) | Public keys need to accurately reflect the user. |
|  | C) | Federal law won't recognize digital signatures alone. |
|  | D) | there are no regulations or rules for PKI |
 |
 |
38 |  |  Many companies create a _____ to improve security in their internet connection: |
|  | A) | PKI |
|  | B) | AES |
|  | C) | VPN |
|  | D) | PGP |
 |
 |
39 |  |  Public networks and _____ represent the two primary types of wireless systems: |
|  | A) | VPNs |
|  | B) | Private LANs |
|  | C) | PGPs |
|  | D) | DES |
 |
 |
40 |  |  Which of the following is not an example of data capture technology? |
|  | A) | Echelon |
|  | B) | Escrow-key |
|  | C) | DCS-10000 |
|  | D) | Kerberos. |
 |
 |
41 |  |  The use of zombie machines in a flood attack is associated with: |
|  | A) | denial of service attacks |
|  | B) | wireless networks attacks |
|  | C) | echelon interceptions |
|  | D) | virtual private network attacks |
 |
 |
42 |  |  Firewalls essentially work by: |
|  | A) | Examining network data before passing through routers |
|  | B) | Encrypts content and sends it via internet |
|  | C) | Verifies the identity of user before letting data transmit |
|  | D) | Provides authentication to all authorized servers |
 |
 |
43 |  |  For more sophisticated firewall protection, an intrusion detection system may be the best solution. Why are they better than regular firewalls? |
|  | A) | They enable all unnecessary ports of the router to the internet |
|  | B) | They use a set of rules to monitor internet traffic |
|  | C) | They incorporate dual key encryption |
|  | D) | They prevent data packet loss |
 |
 |
44 |  |  Web cookies are usually used to: |
|  | A) | monitor employee internet use |
|  | B) | track users returning to a site |
|  | C) | track location of cell phones |
|  | D) | ensure online privacy |
 |
 |
45 |  |  Which law prohibits video stores from releasing rental data? |
|  | A) | 1994 Privacy Act |
|  | B) | 1974 Privacy Act |
|  | C) | Bork Bill |
|  | D) | Family Values Act |
 |
 |
46 |  |  As an Internet user, if you are truly concerned about online and consumer privacy, then the best country to live in is: |
|  | A) | United States |
|  | B) | Canada |
|  | C) | Japan |
|  | D) | France |
 |
 |
47 |  |  With anonymous internet usage made possible, which group of users would likely abuse this concept? |
|  | A) | Telemarketers |
|  | B) | Terrorists |
|  | C) | Government |
|  | D) | Hackers |
 |