Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Public key encryption uses two keys.

(True/False)
4.9/5
(32)

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

(Multiple Choice)
4.8/5
(33)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.8/5
(32)

The Gramm-Leach-Bliley Act:

(Multiple Choice)
4.9/5
(38)

Which of the following statements about botnets is not true?

(Multiple Choice)
4.8/5
(40)

Most computer viruses deliver a:

(Multiple Choice)
4.9/5
(33)

Name and describe four firewall screening technologies.

(Essay)
4.7/5
(38)

Which of the following statements about passwords is not true?

(Multiple Choice)
4.8/5
(33)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.

(Multiple Choice)
4.8/5
(43)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.9/5
(34)

Application controls:

(Multiple Choice)
4.7/5
(41)

Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.

(True/False)
4.8/5
(36)

How does disaster recovery planning differ from business continuity planning?

(Essay)
4.8/5
(38)

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(True/False)
5.0/5
(38)

What is a digital certificate? How does it work?

(Essay)
4.8/5
(34)

Authentication refers to verifying that a person is who he or she claims to be.

(True/False)
4.7/5
(36)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
5.0/5
(42)

The HIPAA Act of 1996:

(Multiple Choice)
4.8/5
(33)

Which of the following focuses primarily on the technical issues of keeping systems up and running?

(Multiple Choice)
4.9/5
(41)

Evil twins are:

(Multiple Choice)
4.9/5
(40)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)