Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up.This is an example of:

Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
Verified

E

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

E

Which of the following refers to all of the methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its accounting records,and operational adherence to management standards?

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

E

Which of the following statements about Internet security is not true?

(Multiple Choice)
5.0/5
(45)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.7/5
(42)

You have just been hired as a security consultant by MegaMalls Inc. ,a chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.

(Essay)
4.9/5
(37)

All of the following are currently being used as traits that can be profiled by biometric authentication except:

(Multiple Choice)
4.8/5
(36)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.

(Multiple Choice)
4.9/5
(28)

Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.

(Essay)
4.8/5
(33)

Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?

(Essay)
4.7/5
(26)

In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.8/5
(37)

An authentication system in which a user must provide two types of identification,such as a bank card and PIN,is called:

(Multiple Choice)
4.8/5
(31)

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?

(Multiple Choice)
5.0/5
(41)

Malicious software programs referred to as spyware include a variety of threats such as computer viruses,worms,and Trojan horses.

(True/False)
4.7/5
(40)

Your company,an online discount pet supply store,has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year.What is the annual expected loss from this exposure?

(Multiple Choice)
4.8/5
(31)

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

(Multiple Choice)
4.9/5
(33)

According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study,the average annualized cost of cybercrime for companies in the United States was approximately:

(Multiple Choice)
4.8/5
(33)

A digital certificate system:

(Multiple Choice)
4.9/5
(38)

A computer virus replicates more quickly than a computer worm.

(True/False)
4.8/5
(39)

The Apple iOS platform is the mobile platform most frequently targeted by hackers.

(True/False)
4.8/5
(40)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)