Question: (Multiple choice) 1. Using a subtly different Internet host name to mimic another business is known as: a. Spoofing. b. Sniffing. c. Web-visit hijacking. d.

(Multiple choice)
1. Using a subtly different Internet host name to mimic another business is known as:
a. Spoofing.
b. Sniffing.
c. Web-visit hijacking.
d. Falsified identity.

2. Passwords and biometrics are both:
a. Authorization controls.
b. Independent check controls.
c. Physical controls.
d. Document controls.

3. Which of the following human features is generally not used in biometrics?
a. Fingerprints.
b. Voice tones.
c. Retina patterns.
d. Weight.

4. Which of the following types of controls is least often used to protect IT processing equipment?
a. Physical controls.
b. Authorization controls.
c. Independent checks or reference.
d. Documents and records.

5. What is the most important factor in control effectiveness?
a. Clear policies regarding controls.
b. An understanding of e-business networks.
c. The use of random monitoring.
d. The “tone at the top.”

6. Secure Web connections are based in:
a. DNS.
b. FTP.
c. HTTPS.
d. FTPS.

Step by Step Solution

3.47 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

c a... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

158-L-B-L-F-M (578).docx

120 KBs Word File

Students Have Also Explored These Related Business Law Questions!