27/11/2024 11:35AM
BFOR 204 Test 1 Questions and Answers
The bottom-up approach in information security implementation means when projects are
initiated at the highest levels of an organization and then pushed to all levels -
Answers✓✓False
Threats are always malicious - Answers✓✓False
Threats are always targeted - Answers✓✓False
Confidentiality ensures that only those with the rights and privileges to modify information are
able to do so - Answers✓✓False, integrity
Which of the following functions does information security perform for an organization? -
Answers✓✓a. Protects the organization's ability to function. b. Enables the safe operation of
applications implemented on the organization's IT systems. c. Protects the data the organization
collects and uses. d. All of the above.
ANSWER: ALL OF ABOVE
Which terms describe actions that can damage or compromise an asset? (Choose two) -
Answers✓✓Threat + Attack
Bob can't connect to Albany.edu. what term among the CIA Triade describes this situation? -
Answers✓✓Availability
, ©Themoon EXAM SOLUTIONS
27/11/2024 11:35AM
Dylan receives new login information in the mail by his company with his login credentials.
His company sent him his login information through the mail, so no unauthorized users see his
information. What term in the CIA Triade describes this situation? -
Answers✓✓Confidentiality
Top-Down approach - Answers✓✓is initiated by upper management with issue policy,
procedures, and processes.
Availability - Answers✓✓ensures authorized users — persons or computer systems — can
access (or use) information without interference or obstruction, and in the required format
A worm is self-replicating and doesn't need user interaction to run. - Answers✓✓True
Unlike worms, viruses do NOT require a host program in order to survive and replicate. -
Answers✓✓False
After Tom turned on his computer, he saw a message indicating that unless he made a payment,
his hard drive would be formatted. What does this indicate? - Answers✓✓Ransomware
Jenny, a sales manager at your company, has been complaining about her computer performing
slowly. When you investigate the issue, you noticed some spyware on her computer, but she
insists the only thing she has downloaded lately was a freeware stock trading application. What
best explains this situation? - Answers✓✓Trojan Horse
Of the following malware types, which one is MOST likely to monitor a user's computer? -
Answers✓✓Spyware