9-16
When you send broadcast mails to a large number of predetermined people, which of the
following is used to specify the destinations easily?
a)
b)
c)
d)
9-17
bcc
Mailing list
Mail transfer
Mailbox
Which of the following describes social engineering?
Which of the following is the appropriate description concerning formulation of the information security policies in a company?
a) They are common in each type of industry, so creating original policies in each company is not required.
b) They are created by a system administrator and care must be taken not to let anyone
else know about them.
c) The concepts and measures for information security in the company are clearly described in a document.
d) The configuration of a firewall is determined and documented.
9-19
Technology element
9-18
Chapter 9
a) It collects a user’s personal information via a questionnaire on a website.
b) It analyzes the utilization history of on-line shopping to predict the product that the
customer is likely to buy.
c) It collects the e-mail addresses publicly available on the website to transmit the
e-mails for advertisements to many people.
d) It picks a piece of paper on which a password is written out of a trash can to obtain a
user’s password, and pretend to be the user when using a system.
Which of the following is the most appropriate description concerning management of the
user IDs and passwords in system operations?
a) Each business system uses a different user ID and password. The user must carry a
list to prevent input mistakes.
b) The company prompts all the employees to change their passwords periodically, and
the users themselves change their passwords.
c) A system distributes the word chosen from the dictionary at random to each user. The
user uses it for a password up to a periodic date of update.
d) The users are encouraged to use a numeric string that is easy to memorize and easy to
use, such as their birthdays and telephone numbers, as their passwords.
306