Which of the following is NOT a mitigation best practice for online banking risks? Question 1 options: Site encryption A shared computer Authentication security Virus scanning

Question 1 (1 point)

Which of the following is NOT a mitigation best practice for online banking risks?

Question 1 options:

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Site encryption

A shared computer

Authentication security

Virus scanning

Question 2 (1 point)

Which of the following are two of the most common online banking threats?

Question 2 options:

Spoofing and phishing

Spoofing and ransomware

Persuasion and shoulder surfing

Phishing and persuasion

Question 3 (1 point)

Which of the following is a means of authentication?

Question 3 options:

Neither A nor B

Kerberos

Both A and B

Public key infrastructure (PKI)

Question 4 (1 point)

In a path traversal attack, the attacker commonly uses __________ to navigate the directory tree to access files in other directories.

Question 4 options:

Boolean Boolean

characters

Windows Explorer

None of the above

Question 5 (1 point)

Data processing converts __________.

Question 5 options:

conclusions into facts

facts into conclusions

information into data

data into information

Question 6 (1 point)

___________ involves protecting sensitive data through encryption.

Question 6 options:

Insecure cryptographic storage

Failure to restrict URL access

Broken authentication and session management

Insecure communications

Question 7 (1 point)

Which of the following is NOT a form of social engineering?

Question 7 options:

Dumpster diving

Shoulder surfing

Phishing

Ransomware

Question 8 (1 point)

Which of the following is a type of hacker?

Question 8 options:

Social engineer

CISSP

Trojan horse

Man-in-the-middle

Question 9 (1 point)

Although manually operated, what was one of the first complex data processing devices?

Question 9 options:

The Analytical Engine

The punch card tabulating system

The Difference Engine

The abacus

Question 10 (1 point)

What uses Authentication Header (AH) and Encapsulating Security Payload (ESP) to create secure data transmissions?

Question 10 options:

XSS

IPSec

DNS

SSL

Question 11 (1 point)

Which of the following is not a common phase of customer life cycle management?

Question 11 options:

Retention

Inception

Conversion

Acquisition

Question 12 (1 point)

Your company has several small branch offices spread throughout the state. Which of the following is the best choice to help branch office personnel meet and work on projects without incurring the cost of traveling?

Question 12 options:

Social media

Audio conferencing

VoIP

Unified collaborative communications (UCC)

Question 13 (1 point)

Which security tenet emphasizes the need for the information to be delivered unaltered to the recipient?

Question 13 options:

Integrity

Authorization

Confidentiality

Availability

Question 14 (1 point)

Which of the following helps to ensure the confidentiality and integrity of data communications?

Question 14 options:

DNS

IPSec

TCP/IP

SNMP

Question 15 (1 point)

Which of the following acts as an intermediary for requests from clients seeking resources from other servers?

Question 15 options:

Perimeter defense

Proxy server

DMZ

Firewall

Question 16 (1 point)

Software that executes on two or more computers in a network is a ___________ application.

Question 16 options:

client/server

Mainframe

Distributed

Peer to peer

Question 17 (1 point)

Which of the following best describes a cookie?

Question 17 options:

A small data file that a Web site may write to your hard drive

A small software program that is stored on a piece of hardware and may be updated to add more functionality

A type of shopping cart

A type of short-range communication network

Question 18 (1 point)

Which of the following is a physical or logical subnetwork that hosts an organization’s external services to an outside network, such as the Internet?

Question 18 options:

Proxy server

Perimeter defense

DMZ

Firewall

Question 19 (1 point)

Which of the following techniques would help a Web application to properly validate user input?

Question 19 options:

Using SSL for all user input

Whitelisting and accepting only known good characters

Blacklisting unknown IP addresses

Cleansing all data in the database

Question 20 (1 point)

The buying and selling of goods and services over the Internet is commonly referred to as __________.

Question 20 options:

social purchasing

brick and mortar sales

network commerce

e-commerce

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"