100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
OBA 340 Quiz 6 Questions And Answers With Complete Updates $11.99   Add to cart

Exam (elaborations)

OBA 340 Quiz 6 Questions And Answers With Complete Updates

 0 view  0 purchase
  • Course
  • OBA 340
  • Institution
  • OBA 340

OBA 340 Quiz 6 Questions And Answers With Complete Updates Which of the following could be one of the ways firms lockdown personnel hardware? A) Regularly reimage the hard-drives of end user PCs B) Dispose of used hardware after annual audits C) Implement frequent overhaul of hardware ...

[Show more]

Preview 2 out of 6  pages

  • August 27, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • oba 340 quiz 6
  • OBA 340
  • OBA 340
avatar-seller
Labtech
OBA 340 Quiz 6 Questions And Answers With
Complete Updates
Which of the following could be one of the ways firms lockdown personnel hardware?



A) Regularly reimage the hard-drives of end user PCs

B) Dispose of used hardware after annual audits

C) Implement frequent overhaul of hardware

D) Mandate the use of industry-standard software alone on company hardware

E) Regularly initiate software auditing ANS A) Regularly reimage the hard-drives of end user PCs



Viruses are programs that infect other software or files and require: ANS an executable program to spread.



A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate,
or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n): ANS
intrusion detection system.



Which weakness of Web sites to launch attacks does an SQL injection technique exploit?



A) Irregular auditing of Web site content

B) Lack of in-built anti-virus features

C) Non-employment of encryption techniques

D) Ease of infiltrating the Web site

E) Sloppy programming practices where software developers do not validate user input ANS E) Sloppy
programming practices where software developers do not validate user input



What type of tool enforces access privileges and helps verify that systems are not being accessed by the
unauthorized, or in suspicious ways? ANS Access control tools



A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login
information. Assuming the message is intended to defraud the customer, what type of infiltration technique is
being used here? ANS Phishing

, The e-mail password of a senior employee in an organization was compromised by someone looking over as the
employee accessed his account. This is most likely a case of: ANS shoulder surfing.



Which of the following best represents a method a social engineer might use to infiltrate a system?



A) Posting rumors about an individual on a popular social networking site

B) Making prank calls to individuals

C) Stealing an individual's credit card information

D) Flooding an individual's mailbox with junkmail

E) Baiting someone to add, deny, or clarify information that can help an attacker ANS E) Baiting someone to
add, deny, or clarify information that can help an attacker



A(n) _____ is someone who uncovers computer weaknesses without exploiting them. ANS white hat hacker



An organization's partner firms that should be regularly audited to ensure that they are compliant with security
frameworks include: ANS technology providers and contract firms.



One of the reasons organizations delay patches to plug holes in their security applications is: ANS the fear that
the new technology contains a change that will cause problems down the road.



Computer systems are often infected with malware by means of exploits that sneak in masquerading as something
they are not. These exploits are called: ANS trojans.



Technologies that measure and analyze human body characteristics for identification or authentication are known
as _____. ANS biometrics



What security risk could be posed by a botnet large enough to hold a few million zombie computers? ANS
Sending spam mail from thousands of difficult-to-shut-down accounts



Updates that plug existing holes in a software are called: ANS patches.



A domain name service is a collection of software that: ANS maps an Internet address to an IP address.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Labtech. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart