Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Gramm-Leach-Bliley Act

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

A

In a walkthrough, hackers are able to bypass security controls of a system with little opposition.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

A

Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used?

(Essay)
4.8/5
(36)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.9/5
(35)

Packet filtering catches most types of network attacks.

(True/False)
4.9/5
(31)

A(n) ________ examines the firm's overall security environment as well as the controls governing individual information systems.

(Short Answer)
4.9/5
(42)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.9/5
(41)

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.9/5
(41)

A digital certificate system

(Multiple Choice)
4.8/5
(30)

For 100% availability, online transaction processing requires

(Multiple Choice)
4.9/5
(32)

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

(True/False)
4.9/5
(39)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.8/5
(41)

Mobile devices are not targeted as extensively by malware as traditional computers.

(True/False)
4.9/5
(36)

A firewall allows the organization to

(Multiple Choice)
4.9/5
(42)

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

(Short Answer)
4.7/5
(36)

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.

(Short Answer)
4.9/5
(33)

A drive-by download is a technique used by hackers to enable accessing files on a wireless network.

(True/False)
5.0/5
(36)

Pharming involves

(Multiple Choice)
4.9/5
(39)

All of the following are methods of ensuring software quality except for

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)