Exam 8: Securing Information Systems
Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?
Student answers will vary.Example answers are: Disaster might be the most difficult because it is unexpected,broad-based,and frequently life threatening.In addition,the company cannot know if the disaster plan will work until a disaster occurs,and then it's too late to make corrections.Security might be the most difficult because it is an ongoing problem,new viruses are devised constantly,and hackers get smarter every day.Furthermore,damage done by a trusted employee from inside cannot be obviated by system security measures.Human error might be most difficult because it isn't caught until too late,and the consequences may be disastrous.Also,administrative error can occur at any level and through any operation or procedure in the company.
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.
A
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:
D
________ is spyware that logs and transmits everything a user types.
An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.
Which of the following refers to policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems?
Hackers and their companion viruses are an increasing problem,especially on the Internet.What are the most important measures for a firm to take to protect itself from this? Is full protection feasible? Why or why not?
Malicious software programs referred to as spyware include a variety of threats such as computer viruses,worms,and Trojan horses.
Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?
________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.
Which of the following statements about wireless security is not true?
Application proxy filtering examines the application content of packets.
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
Which of the following is the single greatest cause of network security breaches?
How is the security of a firm's information system and data affected by its people,organization,and technology? Is the contribution of one of these dimensions any more important than the other? Why?
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)