Which of the following is NOT a mitigation best practice for online banking risks? Question 1 options: Site encryption A shared computer Authentication security Virus scanning
Question 1 (1 point)
Which of the following is NOT a mitigation best practice for online banking risks?
Question 1 options:
Site encryption
A shared computer
Authentication security
Virus scanning
Question 2 (1 point)
Which of the following are two of the most common online banking threats?
Question 2 options:
Spoofing and phishing
Spoofing and ransomware
Persuasion and shoulder surfing
Phishing and persuasion
Question 3 (1 point)
Which of the following is a means of authentication?
Question 3 options:
Neither A nor B
Kerberos
Both A and B
Public key infrastructure (PKI)
Question 4 (1 point)
In a path traversal attack, the attacker commonly uses __________ to navigate the directory tree to access files in other directories.
Question 4 options:
Boolean Boolean
characters
Windows Explorer
None of the above
Question 5 (1 point)
Data processing converts __________.
Question 5 options:
conclusions into facts
facts into conclusions
information into data
data into information
Question 6 (1 point)
___________ involves protecting sensitive data through encryption.
Question 6 options:
Insecure cryptographic storage
Failure to restrict URL access
Broken authentication and session management
Insecure communications
Question 7 (1 point)
Which of the following is NOT a form of social engineering?
Question 7 options:
Dumpster diving
Shoulder surfing
Phishing
Ransomware
Question 8 (1 point)
Which of the following is a type of hacker?
Question 8 options:
Social engineer
CISSP
Trojan horse
Man-in-the-middle
Question 9 (1 point)
Although manually operated, what was one of the first complex data processing devices?
Question 9 options:
The Analytical Engine
The punch card tabulating system
The Difference Engine
The abacus
Question 10 (1 point)
What uses Authentication Header (AH) and Encapsulating Security Payload (ESP) to create secure data transmissions?
Question 10 options:
XSS
IPSec
DNS
SSL
Question 11 (1 point)
Which of the following is not a common phase of customer life cycle management?
Question 11 options:
Retention
Inception
Conversion
Acquisition
Question 12 (1 point)
Your company has several small branch offices spread throughout the state. Which of the following is the best choice to help branch office personnel meet and work on projects without incurring the cost of traveling?
Question 12 options:
Social media
Audio conferencing
VoIP
Unified collaborative communications (UCC)
Question 13 (1 point)
Which security tenet emphasizes the need for the information to be delivered unaltered to the recipient?
Question 13 options:
Integrity
Authorization
Confidentiality
Availability
Question 14 (1 point)
Which of the following helps to ensure the confidentiality and integrity of data communications?
Question 14 options:
DNS
IPSec
TCP/IP
SNMP
Question 15 (1 point)
Which of the following acts as an intermediary for requests from clients seeking resources from other servers?
Question 15 options:
Perimeter defense
Proxy server
DMZ
Firewall
Question 16 (1 point)
Software that executes on two or more computers in a network is a ___________ application.
Question 16 options:
client/server
Mainframe
Distributed
Peer to peer
Question 17 (1 point)
Which of the following best describes a cookie?
Question 17 options:
A small data file that a Web site may write to your hard drive
A small software program that is stored on a piece of hardware and may be updated to add more functionality
A type of shopping cart
A type of short-range communication network
Question 18 (1 point)
Which of the following is a physical or logical subnetwork that hosts an organization’s external services to an outside network, such as the Internet?
Question 18 options:
Proxy server
Perimeter defense
DMZ
Firewall
Question 19 (1 point)
Which of the following techniques would help a Web application to properly validate user input?
Question 19 options:
Using SSL for all user input
Whitelisting and accepting only known good characters
Blacklisting unknown IP addresses
Cleansing all data in the database
Question 20 (1 point)
The buying and selling of goods and services over the Internet is commonly referred to as __________.
Question 20 options:
social purchasing
brick and mortar sales
network commerce
e-commerce
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper
Get Answer Over WhatsApp Order Paper Now
Leave a Reply
Want to join the discussion?Feel free to contribute!