Planning, protection, and response follow a fairly strict sequence from one stage to
another. - answer False
________ is a form of online fraud when bogus clicks are performed to charge the
advertiser without creating potential new customers. - answer Click fraud
Trade secret theft can occur through interception, hacking, and other traditional
cybercrimes. - answer True
Failure to implement PCI-DSS control objectives can result in revocation of a company's
ability to accept credit card payments. - answer True
A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice) - answer SYN Flooding
Someone sends you a "game." When you run it, it logs you into an IRS server. This is
hacking. - answer False
Security professionals should minimize burdens on functional departments. - answer
True
The terms "intellectual property" and "trade secret" are synonymous. - answer False
It is acceptable for an employee to reveal ________. - answer None of these.
Which of the following are ways that trade secret espionage occur? - answer theft
through interception
B) by bribing an employee
C) None of these
Correct Response
D) All of these
________ audits are done by an organization on itself. - answer Internal
________ means responding to risk by taking out insurance. - answer Risk
transference
Attackers cannot use IP address spoofing in port scanning attack packets. - answer
True
, In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest. - answer extortion
Compared to non-computer crime, computer crime is very small. - answer False
What security functions typically are outsourced? - answer Both intrusion detection
and vulnerability testing
In order to demonstrate support for security, top management must ________. - answer
A) ensure that security has an adequate budget
B) support security when there are conflicts between the needs of security and the
needs of other business functions
C) follow security procedures themselves
Correct Response
D) All of these
Policies should be written by ________. - answer corporate teams involving people
from multiple departments
________ examines IT processes for efficiency, effectiveness, and adequate controls. -
answer IT auditing
Different honest people can make different ethical decisions in a given situation. -
answer True
Money mules transfer stolen money for criminals and take a small percentage for
themselves. - answer True
Senior officers often have an additional code of ethics. - answer True
In manual procedures, the segregation of duties ________. - answer reduces risk
Which of the following are types of countermeasures? - answer A) preventative
B) detective
C) corrective
Correct Response
D) All of these
The FTC can ________. - answer Both impose fines and require annual audits by
external auditing firms for many years
Downloading pornography can lead to sexual harassment lawsuits. - answer True