(Multiple choice) 1. Using a subtly different Internet host name to mimic another business is known as:...

Question:

(Multiple choice)
1. Using a subtly different Internet host name to mimic another business is known as:
a. Spoofing.
b. Sniffing.
c. Web-visit hijacking.
d. Falsified identity.

2. Passwords and biometrics are both:
a. Authorization controls.
b. Independent check controls.
c. Physical controls.
d. Document controls.

3. Which of the following human features is generally not used in biometrics?
a. Fingerprints.
b. Voice tones.
c. Retina patterns.
d. Weight.

4. Which of the following types of controls is least often used to protect IT processing equipment?
a. Physical controls.
b. Authorization controls.
c. Independent checks or reference.
d. Documents and records.

5. What is the most important factor in control effectiveness?
a. Clear policies regarding controls.
b. An understanding of e-business networks.
c. The use of random monitoring.
d. The “tone at the top.”

6. Secure Web connections are based in:
a. DNS.
b. FTP.
c. HTTPS.
d. FTPS.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Fraud examination

ISBN: 978-0538470841

4th edition

Authors: Steve Albrecht, Chad Albrecht, Conan Albrecht, Mark zimbelma

Question Posted: