Question 1 (1 point)
Which of the following is NOT a mitigation best practice for online banking risks?
Question 1 options:
A shared computer
Question 2 (1 point)
Which of the following are two of the most common online banking threats?
Question 2 options:
Spoofing and phishing
Spoofing and ransomware
Persuasion and shoulder surfing
Phishing and persuasion
Question 3 (1 point)
Which of the following is a means of authentication?
Question 3 options:
Neither A nor B
Both A and B
Public key infrastructure (PKI)
Question 4 (1 point)
In a path traversal attack, the attacker commonly uses __________ to navigate the directory tree to access files in other directories.
Question 4 options:
None of the above
Question 5 (1 point)
Data processing converts __________.
Question 5 options:
conclusions into facts
facts into conclusions
information into data
data into information
Question 6 (1 point)
___________ involves protecting sensitive data through encryption.
Question 6 options:
Insecure cryptographic storage
Failure to restrict URL access
Broken authentication and session management
Question 7 (1 point)
Which of the following is NOT a form of social engineering?
Question 7 options:
Question 8 (1 point)
Which of the following is a type of hacker?
Question 8 options:
Question 9 (1 point)
Although manually operated, what was one of the first complex data processing devices?
Question 9 options:
The Analytical Engine
The punch card tabulating system
The Difference Engine
Question 10 (1 point)
What uses Authentication Header (AH) and Encapsulating Security Payload (ESP) to create secure data transmissions?
Question 10 options:
Question 11 (1 point)
Which of the following is not a common phase of customer life cycle management?
Question 11 options:
Question 12 (1 point)
Your company has several small branch offices spread throughout the state. Which of the following is the best choice to help branch office personnel meet and work on projects without incurring the cost of traveling?
Question 12 options:
Unified collaborative communications (UCC)
Question 13 (1 point)
Which security tenet emphasizes the need for the information to be delivered unaltered to the recipient?
Question 13 options:
Question 14 (1 point)
Which of the following helps to ensure the confidentiality and integrity of data communications?
Question 14 options:
Question 15 (1 point)
Which of the following acts as an intermediary for requests from clients seeking resources from other servers?
Question 15 options:
Question 16 (1 point)
Software that executes on two or more computers in a network is a ___________ application.
Question 16 options:
Peer to peer
Question 17 (1 point)
Which of the following best describes a cookie?
Question 17 options:
A small data file that a Web site may write to your hard drive
A small software program that is stored on a piece of hardware and may be updated to add more functionality
A type of shopping cart
A type of short-range communication network
Question 18 (1 point)
Which of the following is a physical or logical subnetwork that hosts an organization’s external services to an outside network, such as the Internet?
Question 18 options:
Question 19 (1 point)
Which of the following techniques would help a Web application to properly validate user input?
Question 19 options:
Using SSL for all user input
Whitelisting and accepting only known good characters
Blacklisting unknown IP addresses
Cleansing all data in the database
Question 20 (1 point)
The buying and selling of goods and services over the Internet is commonly referred to as __________.
Question 20 options:
brick and mortar sales