According to the scrum process once the tasks are

This preview shows page 30 - 33 out of 41 pages.

56) According to the scrum process, once the tasks are known for a given set of requirements, thenext step is to assign each task a difficulty score, called ________.A) scrumsB) pointsC) gradesD) talliesAnswer:
B57) The total number of points of work a team can accomplish in each scrum period is called ________.
C
Chapter 121) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
C2) Which of the following is considered a threat caused by human error?
A3) Which of the following is considered a computer crime?A) deletion of records by an employee who is unaware of operating proceduresB) poorly written programs resulting in data lossesC) loss of data as a result of floodingD) hacking of information systemsAnswer:
D4) ________ occurs when someone deceives by pretending to be someone else.
D5) When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
A6) A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
B
7) Email spoofing is a synonym for ________.A) hackingB) phishingC) usurpingD) sniffingAnswer:
B8) ________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.
C9) ________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
C10) Which of the following is an example of a sniffing technique?
D

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture