10 May QuestionWhat is the problem described by the van Ec
Question
What is the problem described by the van Eck phenomenon and studied under
TEMPEST?
A) Magnetic fields that interfere with signals crossing Local Area Network (LAN)
cables
B) Electromagnetic pulses destroying sensitive computer equipment
C) Piggybacking on electromagnetic communications
D) Electromagnetic eavesdropping
2.
Halon is effective at putting out fires and safe for humans but can damage equipment.
A) True
B) False
3.
Your boss needs instructions explaining the steps of how to send encrypted email
properly for all employees. You will need to create the _________.
A) procedure
B) policy
C) guideline
D) standard
4.
Voice recognition, iris scans, and facial geometry can be used for biometric access
controls.
A) True
B) False
5.
Shoulder surfing is when a person looks over the shoulder of another person while typing
pins or passwords.
A) True
B) False
6.
Standards are recommendations relating to a policy.
A) True
B) False
7.
When an attacker attempts to get credit card numbers using telephone and voice
technologies, it’s called
A) Phreaking
B) Telephishing
C) Vishing
D) Voicing
8.
One of the most effective tools for foiling the efforts of a social engineering attack is an
active security awareness program.
A) True
B) False
9.
The greatest danger to networks comes from
A) Attacks coming across the public switched telephone network
B) Natural disasters
C) Foreign hackers
D) Insiders
10.
When an attacker tries to position himself behind a user so that he can see what keys are
being typed or what information is on the screen is called _______________
Correct Answer(s): shoulder surfing
11.
_______________ are mandatory elements regarding the implementation of a policy.
12.
Statements made by management that lays out the organization’s position on an issue are
called ________.
A) procedures
B) policies
C) guidelines
D) standards
13.
All of the following are characteristics of a strong password EXCEPT:
A) Contains special characters, i.e., *%$#@
B) Contains numbers and letters
C) Contains an uncommon dictionary word
D) Contains at least eight characters
14.
_______________ is the simple tactic of following closely behind a person who has just
used their own access card or PIN to gain physical access to a room or building.
Correct Answer(s): Piggybacking
15.
_______________ are devices that have batteries that are used to keep equipment
running in the event of a power outage.
Tutorials for this Question
Available for
$ 2.00
general business data bank
Tutorial # 00003199
Posted On: 11/11/2013 12:35 AM
Posted By:
Best Tutors for school students, college students spqr
Expert tutors with experiences and qualities
Questions: 10473
Tutorials: 11245
Feedback Score: 97% (6248 ratings)
Report this Tutorial as Inappropriate
Tutorial Preview
… …
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
