Read 'Chapter 1: Organizational Policy' & answer the following question(s): |
1. | A good manager will know the types and forms of information generated and how the information is used by the business before planning how to manage it. T F |
| |
| |
2. | In designing and implementing risk-management procedures and controls the manager is not responsible for: |
| |
| |
| |
| |
3. | Optional security policy that defines the limit of acceptable behavior should include: |
| |
| |
| |
| |
4. | The responsibility of the risk-manager does not include: |
| |
| |
| |
| |
5. | Not every organization need define security policies and acceptable behavior. T F |
| |
| |
6. | Proper security safeguards includes all except: |
| |
| |
| |
| |
7. | A security policy includes: |
| |
| |
| |
| |
8. | For a security policy to succeed, it is not necessary for all individuals or departments to participate. T F |
| |
| |
Read 'Chapter 2: Physical Security and Data Preservation' & answer the following question(s): |
9. | The first line of defense for a computer system is to protect it physically: the plant, the equipment, and the personnel. T F |
| |
| |
10. | Safeguards that help protect computer facilities from accidents and disaster like floods and fire include all except: |
| |
| |
| |
| |
11. | Maintenance and preventive care logs should not contain: |
| |
| |
| |
| |
12. | Computer facilities are rarely susceptible to damage from environmental factors. T F |
| |
| |
13. | Computer facilities are susceptible to damage from a variety of environmental factors except: |
| |
| |
| |
| |
14. | Simple precautions to minimize static electricity do not include: |
| |
| |
| |
| |
15. | Data that is no longer needed must be destroyed. T F |
| |
| |
16. | Computer and terminal controls should include the: |
| |
| |
| |
| |
17. | Special fasteners can be used to protect RAM chips and internal components using cover locks on all except: |
| |
| |
| |
| |
Read 'Chapter 3: Hardware Security' & answer the following question(s): |
18. | Software security depends on hardware security. T F |
| |
| |
19. | Which of the following is not one of the most common hardware problems: |
| |
| |
| |
| |
20. | Data integrity can be ensured by: |
| |
| |
| |
| |
21. | Data integrity is as important to protect as actual hardware. T F |
| |
| |
22. | According to computer crime surveys the biggest dollar loss occurs by: |
| |
| |
| |
| |
23. | Major computer vendors offering security products to safeguard user hardware and software are: |
| |
| |
| |
| |
24. | Major vendors offer the following security features except: |
| |
| |
| |
| |
25. | The banks use smart card systems for computer security because they are not vulnerable to high-risk attacks. T F |
| |
| |
26. | Smart Card vulnerabilities do not include: |
| |
| |
| |
| |
27. | A biometric product that is created by sound waves generated by an individual speaking a given phrase or password is a: |
| |
| |
| |
| |
Read 'Chapter 4: Software Security' & answer the following question(s): |
28. | A computer virus is a clinically injected organism into a computer system. T F |
| |
| |
29. | A program that replicates itself but does not infect other programs is a: |
| |
| |
| |
| |
30. | Viruses remain free to spread into other programs because most common viruses give off no symptoms of their infection. T F |
| |
| |
31. | The top information security products and services now in use do not include: |
| |
| |
| |
| |
32. | Which of the following is not a type of viruses: |
| |
| |
| |
| |
33. | Firewalls do not: |
| |
| |
| |
| |
34. | A system that enforces an access control policy between two networks is a: |
| |
| |
| |
| |
35. | Encryption is the transmission of data into secret code. T F |
| |
| |
36. | Which one of the following is not a practical application of Security Socket Layer (SSL)? |
| |
| |
| |
| |
Read 'Chapter 5: Personnel Security' & answer the following question(s): |
37. | It is not necessary to screen or pre-screen potential employees because their resumes guarantee their qualifications and honesty. T F |
| |
| |
38. | when checking and screening for pre-employment backgrounds you do not have to check: |
| |
| |
| |
| |
39. | Companies should insist that new employees in sensitive jobs sign employment agreements with non-disclosure provisions. T F |
| |
| |
40. | Formal performance evaluations should be used to routinely assess employees’ performance and skill level. T F |
| |
| |
41. | Effective performance appraisals will not detect: |
| |
| |
| |
| |
42. | When training new employees which one of the following should not be addressed: |
| |
| |
| |
| |
43. | Employees can cause considerable damage if terminated except for: |
| |
| |
| |
| |
Read 'Chapter 6: Network Security' & answer the following question(s): |
44. | An attacker that is able to read or copy confidential information has: |
| |
| |
| |
| |
45. | Most local area network or communication software packages contain encryption and security features. T F |
| |
| |
46. | It is important to realize that simply keeping the telephone number secret is sufficient. T F |
| |
| |
47. | Which of the following is not a tool used to implement the security plan: |
| |
| |
| |
| |
48. | A saboteur’s tools do not include: |
| |
| |
| |
| |
49. | Which one of the following is not a common type of network topologies: |
| |
| |
| |
| |
50. | Risks related to software bugs cannot easily be reduced by: |
| |
| |
| |
| |
Read 'Chapter 7: Security Policy' & answer the following question(s): |
51. | In formulating a policy you must first ask yourself the following questions except: |
| |
| |
| |
| |
52. | Computer security risk analysis and management does not involve: |
| |
| |
| |
| |
53. | Which of the following is not an example of human factor threats: |
| |
| |
| |
| |
54. | An account administrator is not intended to ensure: |
| |
| |
| |
| |
55. | Disruption in computer processing can be classified as all except: |
| |
| |
| |
| |
56. | Specialists inside and outside organizations who cannot suggest improvements and modifications in contingency planning are: |
| |
| |
| |
| |
57. | Which of the following is not a part of contingency plans: |
| |
| |
| |
| |
58. | Systems and program documentation that should be backed-up do not include: |
| |
| |
| |
| |
59. | Fire damage can be reduced by: |
| |
| |
| |
| |
Read 'Chapter 8: Contingency Planning' & answer the following question(s): |
Read 'Chapter 9: Auditing and Legal Issues' & answer the following question(s): |
60. | Security auditing by Information Technology (IT) auditors and financial auditors can enhance audit efficiency by all except: |
| |
| |
| |
| |
61. | IT auditors typically do not review the following: |
| |
| |
| |
| |
62. | Which one of the following is not a control technique at the environmental level: |
| |
| |
| |
| |
63. | Basic EDI security risks do not encompass: |
| |
| |
| |
| |
Read 'Chapter 10: Computer Crime, Cyber fraud, and Recent Trends' & answer the following question(s): |
64. | Penalties for violation of the U.S. Computer Fraud and Abuse Act include: |
| |
| |
| |
| |
65. | Which one of the following statements is not included in the definition of The Association of Information Technology Professionals (ATIP) computer crime as? |
| |
| |
| |
| |
66. | Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Which of the following is not considered a hacker? |
| |
| |
| |
| |
67. | Many computer crimes involve the theft of money. In the majority of cases, they are: |
| |
| |
| |
| |
68. | Which one of the following would not be considered as a way that a computer virus can enter a computer system? |
| |
| |
| |
| |
69. | The unauthorized use of private and confidential personal information has seriously damaged the privacy of individuals. Which of the following is an example of using the Internet to violate a person's privacy? |
| |
| |
| |
| |
70. | Individuals have been mistakenly arrested and jailed, and people have been denied credit because of their physical profiles. These are examples of: |
| |
| |
| |
| |