Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.7/5
(35)

What are the security challenges faced by wireless networks?

(Essay)
4.8/5
(37)

Viruses can be spread through e-mail.

(True/False)
4.9/5
(36)

An authentication token is a(n)

(Multiple Choice)
4.8/5
(26)

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

(True/False)
4.9/5
(46)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as ________.

(Short Answer)
4.8/5
(32)

Computer worms spread much more rapidly than computer viruses.

(True/False)
4.8/5
(33)

Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?

(Multiple Choice)
4.8/5
(36)

What is a digital certificate? How does it work?

(Essay)
4.9/5
(36)

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called

(Multiple Choice)
4.9/5
(37)

________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

(Short Answer)
4.9/5
(43)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
5.0/5
(32)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.7/5
(32)

An example of phishing is

(Multiple Choice)
4.7/5
(39)

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.9/5
(34)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

(Multiple Choice)
4.8/5
(35)

Downtime refers to periods of time in which a

(Multiple Choice)
4.7/5
(32)

Redirecting a Web link to a different address is a form of

(Multiple Choice)
5.0/5
(36)

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

(Multiple Choice)
4.9/5
(45)

Which of the following is not one of the challenges in securing wireless networks?

(Multiple Choice)
4.8/5
(44)
Showing 61 - 80 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)