ITEE ITEE-1 | Page 312

9-16 When you send broadcast mails to a large number of predetermined people, which of the following is used to specify the destinations easily? a) b) c) d) 9-17 bcc Mailing list Mail transfer Mailbox Which of the following describes social engineering? Which of the following is the appropriate description concerning formulation of the information security policies in a company? a) They are common in each type of industry, so creating original policies in each company is not required. b) They are created by a system administrator and care must be taken not to let anyone else know about them. c) The concepts and measures for information security in the company are clearly described in a document. d) The configuration of a firewall is determined and documented. 9-19 Technology element 9-18 Chapter 9 a) It collects a user’s personal information via a questionnaire on a website. b) It analyzes the utilization history of on-line shopping to predict the product that the customer is likely to buy. c) It collects the e-mail addresses publicly available on the website to transmit the e-mails for advertisements to many people. d) It picks a piece of paper on which a password is written out of a trash can to obtain a user’s password, and pretend to be the user when using a system. Which of the following is the most appropriate description concerning management of the user IDs and passwords in system operations? a) Each business system uses a different user ID and password. The user must carry a list to prevent input mistakes. b) The company prompts all the employees to change their passwords periodically, and the users themselves change their passwords. c) A system distributes the word chosen from the dictionary at random to each user. The user uses it for a password up to a periodic date of update. d) The users are encouraged to use a numeric string that is easy to memorize and easy to use, such as their birthdays and telephone numbers, as their passwords. 306