general business data bank general business data bank

Question # 00003389 Posted By: spqr Updated on: 11/11/2013 12:22 AM Due on: 11/29/2013
Subject Business Topic General Business Tutorials:
Question
Dot Image

What is the problem described by the van Eck phenomenon and studied under

TEMPEST?

A) Magnetic fields that interfere with signals crossing Local Area Network (LAN)

cables

B) Electromagnetic pulses destroying sensitive computer equipment

C) Piggybacking on electromagnetic communications

D) Electromagnetic eavesdropping

2.

Halon is effective at putting out fires and safe for humans but can damage equipment.

A) True

B) False

3.

Your boss needs instructions explaining the steps of how to send encrypted email

properly for all employees. You will need to create the _________.

A) procedure

B) policy

C) guideline

D) standard

4.

Voice recognition, iris scans, and facial geometry can be used for biometric access

controls.

A) True

B) False

5.

Shoulder surfing is when a person looks over the shoulder of another person while typing

pins or passwords.

A) True

B) False

6.

Standards are recommendations relating to a policy.

A) True

B) False

7.

When an attacker attempts to get credit card numbers using telephone and voice

technologies, it's called

A) Phreaking

B) Telephishing

C) Vishing

D) Voicing

8.

One of the most effective tools for foiling the efforts of a social engineering attack is an

active security awareness program.

A) True

B) False

9.

The greatest danger to networks comes from

A) Attacks coming across the public switched telephone network

B) Natural disasters

C) Foreign hackers

D) Insiders

10.

When an attacker tries to position himself behind a user so that he can see what keys are

being typed or what information is on the screen is called _______________

Correct Answer(s): shoulder surfing

11.

_______________ are mandatory elements regarding the implementation of a policy.

12.

Statements made by management that lays out the organization's position on an issue are

called ________.

A) procedures

B) policies

C) guidelines

D) standards

13.

All of the following are characteristics of a strong password EXCEPT:

A) Contains special characters, i.e., *%$#@

B) Contains numbers and letters

C) Contains an uncommon dictionary word

D) Contains at least eight characters

14.

_______________ is the simple tactic of following closely behind a person who has just

used their own access card or PIN to gain physical access to a room or building.

Correct Answer(s): Piggybacking

15.

_______________ are devices that have batteries that are used to keep equipment

running in the event of a power outage.

Dot Image
Tutorials for this Question
  1. Tutorial # 00003199 Posted By: spqr Posted on: 11/11/2013 12:35 AM
    Puchased By: 2
    Tutorial Preview
    The solution of general business data bank...
    Attachments
    252.docx (12.82 KB)

Great! We have found the solution of this question!

Whatsapp Lisa