Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Define computer forensics and describe the types of problems it is designed to address.

(Essay)
4.9/5
(37)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.8/5
(30)

Which of the following refers to policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems?

(Multiple Choice)
4.9/5
(35)

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

(Multiple Choice)
4.9/5
(37)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.9/5
(29)

________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.

(Multiple Choice)
4.8/5
(32)

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

(Multiple Choice)
4.9/5
(32)

Packet filtering catches most types of network attacks.

(True/False)
4.9/5
(49)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.8/5
(31)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.8/5
(39)

________ is malware that logs and transmits everything a user types.

(Multiple Choice)
4.9/5
(41)

Currently,the protocols used for secure information transfer over the Internet are:

(Multiple Choice)
4.8/5
(31)

Which of the following is a type of ambient data?

(Multiple Choice)
4.9/5
(34)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.9/5
(38)

Which of the following statements about wireless security is not true?

(Multiple Choice)
4.8/5
(31)

The intentional defacement or destruction of a website is called:

(Multiple Choice)
4.9/5
(40)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.8/5
(34)

Smartphones typically feature state-of-the-art encryption and security features,making them highly secure tools for businesses.

(True/False)
4.9/5
(31)

You can test software before it is even written by conducting a walkthrough.

(True/False)
4.9/5
(39)

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

(Multiple Choice)
4.8/5
(29)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)