Question: (Multiple choice) 1. Using a subtly different Internet host name to mimic another business is known as: a. Spoofing. b. Sniffing. c. Web-visit hijacking. d.
1. Using a subtly different Internet host name to mimic another business is known as:
a. Spoofing.
b. Sniffing.
c. Web-visit hijacking.
d. Falsified identity.
2. Passwords and biometrics are both:
a. Authorization controls.
b. Independent check controls.
c. Physical controls.
d. Document controls.
3. Which of the following human features is generally not used in biometrics?
a. Fingerprints.
b. Voice tones.
c. Retina patterns.
d. Weight.
4. Which of the following types of controls is least often used to protect IT processing equipment?
a. Physical controls.
b. Authorization controls.
c. Independent checks or reference.
d. Documents and records.
5. What is the most important factor in control effectiveness?
a. Clear policies regarding controls.
b. An understanding of e-business networks.
c. The use of random monitoring.
d. The “tone at the top.”
6. Secure Web connections are based in:
a. DNS.
b. FTP.
c. HTTPS.
d. FTPS.
Step by Step Solution
3.47 Rating (163 Votes )
There are 3 Steps involved in it
c a... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
158-L-B-L-F-M (578).docx
120 KBs Word File
