Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.8/5
(32)

What are the security challenges faced by wireless networks?

(Essay)
4.9/5
(32)

Biometric authentication is the use of personal,biographic details such as the high school you attended and the first street you lived on to provide identification.

(True/False)
4.8/5
(33)

An authentication token is a(n):

(Multiple Choice)
4.8/5
(38)

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

(True/False)
4.9/5
(36)

Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?

(Multiple Choice)
4.7/5
(37)

Organizations can use existing network security software to secure mobile devices.

(True/False)
4.9/5
(29)

Which of the following is the single greatest cause of network security breaches?

(Multiple Choice)
4.8/5
(36)

Viruses can be spread through e-mail.

(True/False)
4.9/5
(46)

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

(Multiple Choice)
4.7/5
(28)

When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called debugging.

(True/False)
4.8/5
(39)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.9/5
(37)

All of the following are types of information systems general controls except:

(Multiple Choice)
4.9/5
(38)

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

(Multiple Choice)
4.9/5
(34)

Which of the following is an example of a keylogger?

(Multiple Choice)
4.7/5
(37)

All of the following have contributed to an increase in software flaws except:

(Multiple Choice)
4.8/5
(36)

Which of the following is the most common type of electronic evidence?

(Multiple Choice)
4.9/5
(44)

The Sarbanes-Oxley Act:

(Multiple Choice)
4.9/5
(38)

Most IoT devices support sophisticated security approaches.

(True/False)
4.9/5
(34)

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

(Multiple Choice)
4.7/5
(34)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)