Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.

(Multiple Choice)
4.8/5
(36)

The most common type of electronic evidence is

(Multiple Choice)
4.8/5
(35)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.9/5
(39)

Which of the following is the greatest threat that employees pose to an organization's information systems?

(Multiple Choice)
4.9/5
(33)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.9/5
(41)

PKI is the use of public key cryptography working with a(n) ________.

(Short Answer)
4.9/5
(35)

The intentional disruption of a Web site or information system is called ________.

(Short Answer)
4.8/5
(28)

A Trojan horse is a software program that appears to be benign but then does something other than expected.

(True/False)
4.9/5
(33)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of

(Multiple Choice)
4.9/5
(34)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.9/5
(38)

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.

(Multiple Choice)
4.8/5
(28)

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

(True/False)
4.9/5
(38)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.7/5
(46)

________ refers to the ability to know that a person is who he or she claims to be.

(Short Answer)
4.7/5
(37)

Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.

(Short Answer)
4.7/5
(41)

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least five Internet security challenges.

(Essay)
4.8/5
(35)

The Sarbanes-Oxley Act

(Multiple Choice)
4.9/5
(44)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

(Multiple Choice)
4.8/5
(33)

Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.

(True/False)
4.9/5
(38)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)