Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In public key encryption,the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

(True/False)
4.7/5
(27)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.7/5
(38)

Most computer viruses deliver a:

(Multiple Choice)
4.9/5
(41)

Two-factor authentication utilizes a(n):

(Multiple Choice)
4.8/5
(33)

In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.9/5
(36)

According to the 2018 Identity Fraud Study by Javelin Strategy & Research,how much did consumers lose to identity fraud in 2017?

(Multiple Choice)
4.8/5
(39)

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

(Multiple Choice)
4.7/5
(33)

Define computer forensics and describe the types of problems it is designed to address.

(Essay)
4.8/5
(40)

As described in the chapter case,losing smartphones is a common cause of data breaches.

(True/False)
4.9/5
(34)

Phishing is a form of spoofing.

(True/False)
4.9/5
(44)

In cloud computing,accountability and responsibility for protection of sensitive data resides with the company owning the data.

(True/False)
4.8/5
(38)

According to Ponemon Institute's 2017 Annual Cost of Cyber Crime Study,the average annualized cost of cybercrime for benchmarked companies in seven different countries was approximately:

(Multiple Choice)
4.9/5
(36)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.9/5
(36)

Symmetric encryption uses one key.

(True/False)
4.9/5
(36)

Fault tolerant information systems offer 100 percent availability because they use:

(Multiple Choice)
4.9/5
(36)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.9/5
(37)

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

(Multiple Choice)
4.7/5
(41)

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up.This is an example of:

(Multiple Choice)
4.9/5
(37)

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

(True/False)
4.8/5
(41)

Smartphones typically feature state-of-the-art encryption and security features,making them highly secure tools for businesses.

(True/False)
4.8/5
(38)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)