Professional Documents
Culture Documents
Kuis Bab 8
Kuis Bab 8
2) Which of the following refers to all of the methods, policies, and organizational
procedures that ensure the safety of the organization's assets, the accuracy and
reliability of its accounting records, and operational adherence to management
standards? *
Legacy systems
Vulnerabilities
-Controls
Security policy
4) All of the following are specific security challenges that threaten the
communications lines in a client/server environment except: *
tapping
-errors
theft and fraud
radiation
5) All of the following are specific security challenges that threaten corporate systems
in a client/server environment except: *
theft of data
copying of data
alteration of data
radiation
10/10
The use of P2P networks can expose a corporate computer to outsiders
A corporate network without access to the Internet is more secure than one that
provides access
-VoIP is more secure than the switched voice network
Instant messaging can provide hackers access to an otherwise secure network
10/10
spoofing
cybervandalism
cyberwarfare
phishing
10) Which of the following is the single greatest cause of network security
breaches? *
Viruses
Trojan horses
User lack of knowledge
Cyberwarfare