Site MapHelpFeedbackPre-Test
Pre-Test
(See related pages)

1
What is the recommended way to implement information security lines of defense?
A)People first, technology second
B)Technology first, people second
C)None of the above
D)All of the above
2
Which of the following is not one of the five steps for creating an information security plan?
A)Develop the information security policies
B)Communicate the information security policies
C)Revise and test the information security policies
D)Test and reevaluate risks
3
What is social engineering?
A)Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B)Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C)Small electronic devices that change user passwords automatically
D)A method for confirming user's identities
4
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
A)Token
B)Password
C)Smart card
D)Biometrics
5
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
A)Malicious code
B)Hoaxes
C)Spoofing
D)Sniffer
6
What are the principles and standards that guide our behavior toward other people?
A)Ethics
B)Intellectual property
C)Copyright
D)Fair Use Doctrine
7
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A)Fair Use Doctrine
B)Pirated software
C)Counterfeit software
D)Privacy
8
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
A)Ethical computer use policy
B)Acceptable use policy
C)Nonrepudiation policy
D)None of the above
9
Which policy details the extent to which e-mail messages may be read by others?
A)Acceptable use policy
B)E-mail privacy policy
C)Internet use policy
D)None of the above
10
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
A)Spyware
B)Hardware key logger
C)Cookie
D)Adware







LS4 (UMUC) IS In Org Std OLCOnline Learning Center

Home > Chapter 4 > Pre-Test