Filters
Question type

Study Flashcards

What was the first international treaty seeking to address computer crimes?


A) Council of Europe Convention on Cybercrime
B) NATO Treaty on Cybercrime
C) The Hague Cybercrime Treaty
D) The International Cybercrime Treaty

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Sally helps determine risk issues at her job. She has informed her boss that there are no safeguards put in place to protect against threats. What type of risk is this company under?


A) Handled Risk
B) Possible Risk
C) Total Risk
D) Residual Risk

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

XYZ Pharmaceutical is being sued because their baby aspirin was contaminated. The CEO wanted to cut corners to save money and increase his bonus. What type of law will deal with this company?


A) Civil Law
B) Common Law
C) Administrative Law
D) Criminal Law

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Company XYZ just hired Richard and insists that to protect the company he sign:


A) Employee Jurisdiction Form
B) Nondisclosure Agreement
C) Corporate Employee Analysis
D) All of the above

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Indecisive is working on his company's Business Continuity Plan and performing the Business Impact Analysis. One of the critical processes that he has identified is year-end tax documentation and preparation. However, because this is a seasonal process, he is unsure of how to handle it in his analysis. What advice should you give Mr. Indecisive?


A) Determine the recovery time objective based on the shortest time required (when it is tax season)
B) Determine the recovery time objective based on the non-tax season time period (since this is the majority of the year)
C) Calculate optimal recovery time for both scenarios - tax season and non-tax season - and average the two together to get the overall optimal recovery time objective
D) Create two different recovery time objectives - one based on tax season and one on non-tax season - and include both in the report.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Indecisive is assigned responsibility for creating the initial draft of the Risk Assessment. When Mr. Newbie is assigned to help with prioritization of the threats identified in the Risk Assessment. Each potential threat is already listed, along with its likelihood and severity rating. In order to create a priority list and order the threats correctly, what should Mr. Newbie do?


A) Organize the lists alphabetically and assign priority based on the order that the threats appear in the alphabetical lists.
B) Create two lists-one is a priority list based on likelihood and the other is a priority list based on severity.
C) Multiply the likelihood rating with the severity rating and then organize the list according to that number (the relative weight) . The higher the relative weight, the higher the priority.
D) Add the likelihood rating to the severity rating and then organize the list according to that number (the relative weight) . The higher the relative weight, the higher the priority.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

April's computer is acting strange. She keeps trying to find information that she worked on yesterday, but the computer keeps displaying the incorrect information. She thinks the problem is with the memory of the hardware. Where does April think the problem is?


A) Central Access Unit
B) System Access Unit
C) Central Processing Unit
D) System Processing Unit

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is the assurance that information is not disclosed by an unauthorized individual, program, or process?


A) Trust
B) Confidentiality
C) Secret Keeping
D) None of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

I wish to find as much information about as many people as possible without them knowing about it and I need to see who has modems. How should I go about this?


A) Browsing
B) Wardialing
C) Line Attacks
D) None of the Above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Thad is applying to gain legal ownership of his invention. What is Thad applying for?


A) Trademark
B) Intellectual Property Protection
C) Patent
D) Trade Secret

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Rick is a security guard at his job. He has worked there for the past 15 years and knows everyone by name and trusts them. Every so often there is a face he doesn't recognize, but trusts the person that the individual is walking with. What would this situation be called?


A) Tracking
B) Porting
C) Piggybacking
D) Back-riding

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 51 of 51

Related Exams

Show Answer