Professional Documents
Culture Documents
A 2. D 3. A 4. D
A 2. D 3. A 4. D
2. D
3. A
4. D
5. A
6. B
7. C
8. D
9. C
10. D
1. It is a computer program that replicates and propagates itself without having to attach itself to a host.
A. Trojan Program
B. Adware
C. Spyware
D. Worm*
B. The organization must exhaust its efforts in protecting its own data and that of the related third
parties as well.
D. Size and scope of the organization is of primary interest in formulating steps to safeguard technology
assets.
3. STATEMENT A: Data is the lifeblood of an organization because without it, no value can be delivered
to clients.
STATEMENT B: Concern for information security is solely delegated to the management to oversee.
C. Only A is incorrect
D. Only B is incorrect*
4. All of the following are considered organization-level controls except:
A. Personnel controls
C. Processing controls*
5. What type of risk exists before plans are made to control it?
A. Residual Risk
B. Historical Risk
C. Current Risk
D. Inherent Risk*
I. Share
II. Accept
III. Develop
A. I and II*
B. I and III
C. II and III
D. I, II and III
B. Trap door
C. Phreaker*
D. Polymorphic
A. Section 2A-1 of the Cybercrime Prevention Act refers to the illegal access to a computer system
without any right.*
B. Bots are often the technology used to implement Trojan horses, logic bombs and spyware.
10. Which of the following is not a broad category of activities that breach confidentiality?
C. Shoulder surfing
D. Power irregularities*