Business Continuity Planning Computer Science Questionnaire
1.) Which statement is true of phishing? (Ch. 5) Group of answer choices It consists of self-propagating program code that is triggered by a specified time or event.
It prevents the disclosure of information to anyone who is not authorized to access it.
It is the result of inadvertent employee activity.
It involves sending fraudulent e-mails that seem to come from legitimate sources.
It involves monitoring and recording keystrokes.
2.) A denial-of-service (DoS) attack _______________________ . (Ch. 5)
Group of answer choices
mean that a system must prevent disclosing information to anyone who is not authorized to access it
a programming routine built into a system by it’s designer to bypass system security and sneak back in to access programs or files
None of the Above
floods a network or server with service requests to prevent legitimate user‘s access to the system.
using people skills to trick others into revealing private information
3.) A(n) ______________ contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program. (Ch. 5)
Group of answer choices
Trojan program
backdoor
exit application
withdrawal suite
PageRank
4.) ____________________ provides a secure tunnel though the internet for transmitting messages and data via a private network. (Ch. 5)
Group of answer choices
Backdoor network
ERP system network
Social engineering
Business continuity planning
Virtual Private Network
5.) _______________ is one of the most popular password managers. (Ch. 5)
Group of answer choices
FilePro
STOPzilla
CounterSpy
Lockout Manager
Dashlane