41) An organization takes active countermeasures to protect its systems, such as installing firewalls. This approach is ________. A) risk reduction B) risk acceptance C) risk rescheduling D) risk transference E) risk postponing 42) An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur. This approach is called ________. A) risk acceptance B) risk reduction C) risk mitigation D) risk transference E) risk rescheduling 43) Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers and its databases contain valuable information about its customers. The loss of customer information used to decide services would be extremely harmful to the organization. Which of the following strategies used by Ciscon is an example of risk transference? A) The company insures any possible data loss for a large sum. B) The company forms a special team of top executives to monitor and correct the information policies. C) It installs a corporate firewall to protect unauthorized access to information. D) It enforces a strict employee data policy and prohibits employees from unauthorized access. E) The company decides to absorb any damages that might occur. 44) RBS Publishing is a leading media company in France. The company handles sensitive information and often finds it susceptible to information threats. As a counter measure the company installs strong firewalls and protective software. These steps are a part of ________ strategy. A) risk acceptance B) risk reduction C) risk mitigation D) risk transference E) risk rescheduling 45) An organization is using physical access restrictions to safeguard information systems when it uses ________. A) audit-control software B) firewalls C) encryption D) passwords E) secure data centers 46) Your company uses a fingerprint recognition system instead of an access card. This helps the company prevent unauthorized physical access. Which of the following technologies is used for restriction here? A) biometrics B) virtual private networks C) secure tunneling D) access-control software E) encryption 47) An organization is using biometrics when it uses ________ to identify employees. A) fingerprints B) access cards C) pattern formations D) bar codes E) code numbers 48) ________ software allows computer users access only to those files related to their work. A) Access-control B) Firewall C) Audit-control D) Denial-of-service E) Risk analysis 49) An attacker accesses a network, intercepts data from it, and uses network services and sends attack instructions to it without entering the home, office, or organization that owns the network. This new form of attack is known as ________ attack. A) drive-by hacking B) hacktivist C) honeypot D) cybersquatting E) denial-of-service 50) Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe. The company is heavily dependent on Internet for transporting data. The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised. Which of the following would be most helpful to the company in achieving this goal? A) spam filtering B) hot backing up C) tunneling D) open transmitting E) disaster recovery planning