100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Exam Review Questions and Answers $12.99   Add to cart

Exam (elaborations)

Exam Review Questions and Answers

 5 views  0 purchase
  • Course
  • Pci
  • Institution
  • Pci

Exam Review Questions and Answers Planning, protection, and response follow a fairly strict sequence from one stage to another. False ________ is a form of online fraud when bogus clicks are performed to charge the advertiser without creating potential new customers. Click fraud ...

[Show more]

Preview 2 out of 15  pages

  • November 3, 2024
  • 15
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Pci
  • Pci
avatar-seller
Pogba119
Exam Review Questions and Answers
Planning, protection, and response follow a fairly strict sequence from one stage to
another. - answer False

________ is a form of online fraud when bogus clicks are performed to charge the
advertiser without creating potential new customers. - answer Click fraud

Trade secret theft can occur through interception, hacking, and other traditional
cybercrimes. - answer True

Failure to implement PCI-DSS control objectives can result in revocation of a company's
ability to accept credit card payments. - answer True

A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice) - answer SYN Flooding

Someone sends you a "game." When you run it, it logs you into an IRS server. This is
hacking. - answer False

Security professionals should minimize burdens on functional departments. - answer
True

The terms "intellectual property" and "trade secret" are synonymous. - answer False

It is acceptable for an employee to reveal ________. - answer None of these.

Which of the following are ways that trade secret espionage occur? - answer theft
through interception

B) by bribing an employee

C) None of these
Correct Response
D) All of these

________ audits are done by an organization on itself. - answer Internal

________ means responding to risk by taking out insurance. - answer Risk
transference

Attackers cannot use IP address spoofing in port scanning attack packets. - answer
True

, In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest. - answer extortion

Compared to non-computer crime, computer crime is very small. - answer False

What security functions typically are outsourced? - answer Both intrusion detection
and vulnerability testing

In order to demonstrate support for security, top management must ________. - answer
A) ensure that security has an adequate budget

B) support security when there are conflicts between the needs of security and the
needs of other business functions

C) follow security procedures themselves
Correct Response
D) All of these

Policies should be written by ________. - answer corporate teams involving people
from multiple departments

________ examines IT processes for efficiency, effectiveness, and adequate controls. -
answer IT auditing

Different honest people can make different ethical decisions in a given situation. -
answer True

Money mules transfer stolen money for criminals and take a small percentage for
themselves. - answer True

Senior officers often have an additional code of ethics. - answer True

In manual procedures, the segregation of duties ________. - answer reduces risk

Which of the following are types of countermeasures? - answer A) preventative

B) detective

C) corrective
Correct Response
D) All of these

The FTC can ________. - answer Both impose fines and require annual audits by
external auditing firms for many years

Downloading pornography can lead to sexual harassment lawsuits. - answer True

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Pogba119. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64438 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart