PDF Download
FREE AND STUDY GAMES ABOUT ITN 266 CHAP 1 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -20 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: If TJX had met the PCI-DSS control objectives, it would have ________ avoided the data breach.
Answer:
probably
Question 2: ________ is a generic term for "evil software."
Answer:
Malware Question 3: Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.
Answer:
False
Question 4: Nonmobile malware can be on webpages that users download.
Answer:
True
Question 5: ________ can spread through e-mail attachments.
Answer:
Both Viruses and Worms
Question 6: In a virus, the code that does damage is called the ________.
Answer:
Payload
Question 7: ________ is the destruction of hardware, software, or data.
Answer:
Sabotage Question 8: Detective countermeasures identify when a threat is attacking and especially when it is succeeding.
Answer:
True
Question 9: Detective countermeasures keep attacks from succeeding.
Answer:
False
Question 10: Which of the following CIA security goals did TJX fail to meet?
Answer:
confidentiality Question 11: You have access to your home page on a server. By accident, you discover that if you hit a certain key, you can get into someone else's files. You spend just a few minutes looking around. This is hacking.
Answer:
True
Question 12: Which of the following can be a type of spyware?
Answer:
Both a cookie and a keystroke logger
Question 13: The fastest propagation occurs with some types of ________.
Answer:
worms
Question 14: Penalties for hacking are ________.
Answer:
irrelevant of the amount stolen
Question 15: Employees are very dangerous because they ________.
Answer:
Both often have access to sensitive parts of the system and are trusted by companies Question 16: Some ________ can jump directly between computers without human intervention.
Answer:
worms
Question 17: Preventative countermeasures keep attacks from succeeding.
Answer:
True
Question 18: Most cookies are dangerous.
Answer:
False Question 19: In fraud, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.
Answer:
False Question 20: Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.
Answer:
True