Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A Trojan horse:

(Multiple Choice)
4.9/5
(43)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.7/5
(38)

Explain how two-factor authentication increases security.

(Essay)
4.8/5
(37)

CryptoLocker is an example of which of the following?

(Multiple Choice)
4.9/5
(38)

Computer forensics tasks include all of the following except:

(Multiple Choice)
4.8/5
(40)

According to the 2016 Identity Fraud Study by Javelin Strategy & Research,how much did consumers lose to identity fraud in 2015?

(Multiple Choice)
4.8/5
(35)

Hackers and their companion viruses are an increasing problem,especially on the Internet.What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.7/5
(43)

For 100-percent availability,online transaction processing requires:

(Multiple Choice)
4.9/5
(36)

The dispersed nature of cloud computing makes it difficult to track unauthorized access.

(True/False)
4.9/5
(36)

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

(Multiple Choice)
4.7/5
(35)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.9/5
(44)

A firewall allows the organization to:

(Multiple Choice)
4.7/5
(37)

What is the role of an information systems audit?

(Essay)
4.7/5
(34)

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:

(Multiple Choice)
4.9/5
(37)

How is the security of a firm's information system and data affected by its people,organization,and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.8/5
(46)

Target has had to pay out over $100 million to U.S.banks,credit card companies and consumers as a result of a data breach in 2013.

(True/False)
4.8/5
(36)

Pharming involves:

(Multiple Choice)
4.9/5
(35)

Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.

(Multiple Choice)
4.9/5
(41)

A statement ranking information risks and identifying security goals would be included in which of the following?

(Multiple Choice)
4.9/5
(38)

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

(Essay)
4.9/5
(42)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)