BFOR 204 Test 1 Questions And Accurate
Answers 100% Correct
The bottom-up approach in information security implementation means when projects
are initiated at the highest levels of an organization and then pushed to all levels -
ANSWER False
Threats are always malicious - ANSWER False
Threats are always targeted - ANSWER False
Confidentiality ensures that only those with the rights and privileges to modify
information are able to do so - ANSWER False, integrity
Which of the following functions does information security perform for an organization? -
ANSWER a. Protects the organization's ability to function. b. Enables the safe operation
of applications implemented on the organization's IT systems. c. Protects the data the
organization collects and uses. d. All of the above.
ANSWER: ALL OF ABOVE
Which terms describe actions that can damage or compromise an asset? (Choose two) -
ANSWER Threat + Attack
Bob can't connect to Albany.edu. what term among the CIA Triade describes this
situation? - ANSWER Availability
Dylan receives new login information in the mail by his company with his login
credentials. His company sent him his login information through the mail, so no
unauthorized users see his information. What term in the CIA Triade describes this
situation? - ANSWER Confidentiality
, Top-Down approach - ANSWER is initiated by upper management with issue policy,
procedures, and processes.
Availability - ANSWER ensures authorized users — persons or computer systems — can
access (or use) information without interference or obstruction, and in the required
format
A worm is self-replicating and doesn't need user interaction to run. - ANSWER True
Unlike worms, viruses do NOT require a host program in order to survive and replicate. -
ANSWER False
After Tom turned on his computer, he saw a message indicating that unless he made a
payment, his hard drive would be formatted. What does this indicate? - ANSWER
Ransomware
Jenny, a sales manager at your company, has been complaining about her computer
performing slowly. When you investigate the issue, you noticed some spyware on her
computer, but she insists the only thing she has downloaded lately was a freeware stock
trading application. What best explains this situation? - ANSWER Trojan Horse
Of the following malware types, which one is MOST likely to monitor a user's computer?
- ANSWER Spyware
What type of malicious software masquerades as legitimate software to entice the user
to run it? - ANSWER Trojan Horse
Lisa recently developed an application for the Human Resources department. Personnel
use this application to store and manage employee data, including PII. She programmed
in the ability to access this application with a username and password that only she
knows, so that she can perform remote maintenance on the application if necessary.
Which of the following does this describe? - ANSWER Backdoor
Answers 100% Correct
The bottom-up approach in information security implementation means when projects
are initiated at the highest levels of an organization and then pushed to all levels -
ANSWER False
Threats are always malicious - ANSWER False
Threats are always targeted - ANSWER False
Confidentiality ensures that only those with the rights and privileges to modify
information are able to do so - ANSWER False, integrity
Which of the following functions does information security perform for an organization? -
ANSWER a. Protects the organization's ability to function. b. Enables the safe operation
of applications implemented on the organization's IT systems. c. Protects the data the
organization collects and uses. d. All of the above.
ANSWER: ALL OF ABOVE
Which terms describe actions that can damage or compromise an asset? (Choose two) -
ANSWER Threat + Attack
Bob can't connect to Albany.edu. what term among the CIA Triade describes this
situation? - ANSWER Availability
Dylan receives new login information in the mail by his company with his login
credentials. His company sent him his login information through the mail, so no
unauthorized users see his information. What term in the CIA Triade describes this
situation? - ANSWER Confidentiality
, Top-Down approach - ANSWER is initiated by upper management with issue policy,
procedures, and processes.
Availability - ANSWER ensures authorized users — persons or computer systems — can
access (or use) information without interference or obstruction, and in the required
format
A worm is self-replicating and doesn't need user interaction to run. - ANSWER True
Unlike worms, viruses do NOT require a host program in order to survive and replicate. -
ANSWER False
After Tom turned on his computer, he saw a message indicating that unless he made a
payment, his hard drive would be formatted. What does this indicate? - ANSWER
Ransomware
Jenny, a sales manager at your company, has been complaining about her computer
performing slowly. When you investigate the issue, you noticed some spyware on her
computer, but she insists the only thing she has downloaded lately was a freeware stock
trading application. What best explains this situation? - ANSWER Trojan Horse
Of the following malware types, which one is MOST likely to monitor a user's computer?
- ANSWER Spyware
What type of malicious software masquerades as legitimate software to entice the user
to run it? - ANSWER Trojan Horse
Lisa recently developed an application for the Human Resources department. Personnel
use this application to store and manage employee data, including PII. She programmed
in the ability to access this application with a username and password that only she
knows, so that she can perform remote maintenance on the application if necessary.
Which of the following does this describe? - ANSWER Backdoor