x
Info
x
Warning
x
Danger
 / 
 / 
 / 
41) Evil twins are: A) Trojan horses that appears to the

Question : 41) Evil twins are: A) Trojan horses that appears to the : 1927968

41) Evil twins are:

A) Trojan horses that appears to the user to be a legitimate commercial software application.

B) e-mail messages that mimic the e-mail messages of a legitimate business.

C) fraudulent Web sites that mimic a legitimate business's Web site.

D) bogus wireless network access points that look legitimate to users.

42) Pharming involves:

A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

B) pretending to be a legitimate business's representative in order to garner information about a security system.

C) setting up fake Web sites to ask users for confidential information.

D) using e-mails for threats or harassment.

43) You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

A) Wireless network

B) Employees

C) Authentication procedures

D) Lack of data encryption

44) Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:

A) sniffing.

B) social engineering.

C) phishing.

D) pharming.

45) How do software vendors correct flaws in their software after it has been distributed?

A) They issue bug fixes.

B) They issue patches.

C) They re-release the software.

D) They release updated versions of the software.

46) The HIPAA Act of 1996:

A) requires financial institutions to ensure the security of customer data.

B) specifies best practices in information systems security and control.

C) imposes responsibility on companies and management to safeguard the accuracy of financial information.

D) outlines medical security and privacy rules.

47) The Gramm-Leach-Bliley Act:

A) requires financial institutions to ensure the security of customer data.

B) specifies best practices in information systems security and control.

C) imposes responsibility on companies and management to safeguard the accuracy of financial information.

D) outlines medical security and privacy rules.

48) The Sarbanes-Oxley Act:

A) requires financial institutions to ensure the security of customer data.

B) specifies best practices in information systems security and control.

C) imposes responsibility on companies and management to safeguard the accuracy of financial information.

D) outlines medical security and privacy rules.

49) The most common type of electronic evidence is:

A) voice-mail.

B) spreadsheets.

C) instant messages.

D) e-mail.

50) Electronic evidence on computer storage media that is not visible to the average user is called ________ data.

A) defragmented

B) ambient

C) forensic

D) fragmented

Solution
5 (1 Ratings )

Solved
Accounting 1 Year Ago 80 Views
This Question has Been Answered!

Related Answers
Unlimited Access Free
Explore More than 2 Million+
  • Textbook Solutions
  • Flashcards
  • Homework Answers
  • Documents
Signup for Instant Access!
Ask an Expert
Our Experts can answer your tough homework and study questions
150417 Accounting Questions Answered!
Post a Question