| Read 'Chapter 1: Organizational Policy' & answer the following question(s): | 
		| 1. | A good manager will know the types and forms of information generated and how the information is used by the business before planning how to manage it. T F | 
		|  |  | 
		|  |  | 
		| 2. | In designing and implementing risk-management procedures and controls the manager is not responsible for: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 3. | Optional security policy that defines the limit of acceptable behavior should include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 4. | The responsibility of the risk-manager does not include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 5. | Not every organization need define security policies and acceptable behavior. T F | 
		|  |  | 
		|  |  | 
		| 6. | Proper security safeguards includes all except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 7. | A security policy includes: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 8. | For a security policy to succeed, it is not necessary for all individuals or departments to participate. T F | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 2: Physical Security and Data Preservation' & answer the following question(s): | 
		| 9. | The first line of defense for a computer system is to protect it physically: the plant, the equipment, and the personnel. T F | 
		|  |  | 
		|  |  | 
		| 10. | Safeguards that help protect computer facilities from accidents and disaster like floods and fire include all except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 11. | Maintenance and preventive care logs should not contain: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 12. | Computer facilities are rarely susceptible to damage from environmental factors. T F | 
		|  |  | 
		|  |  | 
		| 13. | Computer facilities are susceptible to damage from a variety of environmental factors except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 14. | Simple precautions to minimize static electricity do not include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 15. | Data that is no longer needed must be destroyed. T F | 
		|  |  | 
		|  |  | 
		| 16. | Computer and terminal controls should include the: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 17. | Special fasteners can be used to protect RAM chips and internal components using cover locks on all except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 3: Hardware Security' & answer the following question(s): | 
		| 18. | Software security depends on hardware security. T F | 
		|  |  | 
		|  |  | 
		| 19. | Which of the following is not one of the most common hardware problems: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 20. | Data integrity can be ensured by: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 21. | Data integrity is as important to protect as actual hardware. T F | 
		|  |  | 
		|  |  | 
		| 22. | According to computer crime surveys the biggest dollar loss occurs by: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 23. | Major computer vendors offering security products to safeguard user hardware and software are: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 24. | Major vendors offer the following security features except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 25. | The banks use smart card systems for computer security because they are not vulnerable to high-risk attacks. T F | 
		|  |  | 
		|  |  | 
		| 26. | Smart Card vulnerabilities do not include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 27. | A biometric product that is created by sound waves generated by an individual speaking a given phrase or password is a: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 4: Software Security' & answer the following question(s): | 
		| 28. | A computer virus is a clinically injected organism into a computer system. T F | 
		|  |  | 
		|  |  | 
		| 29. | A program that replicates itself but does not infect other programs is a: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 30. | Viruses remain free to spread into other programs because most common viruses give off no symptoms of their infection. T F | 
		|  |  | 
		|  |  | 
		| 31. | The top information security products and services now in use do not include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 32. | Which of the following is not a type of viruses: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 33. | Firewalls do not: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 34. | A system that enforces an access control policy between two networks is a: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 35. | Encryption is the transmission of data into secret code. T F | 
		|  |  | 
		|  |  | 
		| 36. | Which one of the following is not a practical application of Security Socket Layer (SSL)? | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 5: Personnel Security' & answer the following question(s): | 
		| 37. | It is not necessary to screen or pre-screen potential employees because their resumes guarantee their qualifications and honesty. T F | 
		|  |  | 
		|  |  | 
		| 38. | when checking and screening for pre-employment backgrounds you do not have to check: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 39. | Companies should insist that new employees in sensitive jobs sign employment agreements with non-disclosure provisions. T F | 
		|  |  | 
		|  |  | 
		| 40. | Formal performance evaluations should be used to routinely assess employees’ performance and skill level. T F | 
		|  |  | 
		|  |  | 
		| 41. | Effective performance appraisals will not detect: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 42. | When training new employees which one of the following should not be addressed: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 43. | Employees can cause considerable damage if terminated except for: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 6: Network Security' & answer the following question(s): | 
		| 44. | An attacker that is able to read or copy confidential information has: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 45. | Most local area network or communication software packages contain encryption and security features. T F | 
		|  |  | 
		|  |  | 
		| 46. | It is important to realize that simply keeping the telephone number secret is sufficient. T F | 
		|  |  | 
		|  |  | 
		| 47. | Which of the following is not a tool used to implement the security plan: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 48. | A saboteur’s tools do not include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 49. | Which one of the following is not a common type of network topologies: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 50. | Risks related to software bugs cannot easily be reduced by: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 7: Security Policy' & answer the following question(s): | 
		| 51. | In formulating a policy you must first ask yourself the following questions except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 52. | Computer security risk analysis and management does not involve: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 53. | Which of the following is not an example of human factor threats: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 54. | An account administrator is not intended to ensure: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 55. | Disruption in computer processing can be classified as all except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 56. | Specialists inside and outside organizations who cannot suggest improvements and modifications in contingency planning are: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 57. | Which of the following is not a part of contingency plans: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 58. | Systems and program documentation that should be backed-up do not include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 59. | Fire damage can be reduced by: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 8: Contingency Planning' & answer the following question(s): | 
		| Read 'Chapter 9: Auditing and Legal Issues' & answer the following question(s): | 
		| 60. | Security auditing by Information Technology (IT) auditors and financial auditors can enhance audit efficiency by all except: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 61. | IT auditors typically do not review the following: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 62. | Which one of the following is not a control technique at the environmental level: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 63. | Basic EDI security risks do not encompass: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| Read 'Chapter 10: Computer Crime, Cyber fraud, and Recent Trends' & answer the following question(s): | 
		| 64. | Penalties for violation of the U.S. Computer Fraud and Abuse Act include: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 65. | Which one of the following statements is not included in the definition of The Association of Information Technology Professionals (ATIP) computer crime as? | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 66. | Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Which of the following is not considered a hacker? | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 67. | Many computer crimes involve the theft of money.  In the majority of cases, they are: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 68. | Which one of the following would not be considered as a way that a computer virus can enter a computer system? | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 69. | The unauthorized use of private and confidential personal information has seriously damaged the privacy of individuals. Which of the following is an example of using the Internet to violate a person's privacy? | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  | 
		| 70. | Individuals have been mistakenly arrested and jailed, and people have been denied credit because of their physical profiles. These are examples of: | 
		|  |  | 
		|  |  | 
		|  |  | 
		|  |  |