Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer forensics tasks include all of the following except:

(Multiple Choice)
4.8/5
(39)

An authentication system in which a user must provide two types of identification,such as a bank card and PIN,is called:

(Multiple Choice)
4.7/5
(35)

A firewall allows the organization to:

(Multiple Choice)
4.7/5
(27)

When hackers gain access to a database containing your personal private information,this is an example of:

(Multiple Choice)
4.7/5
(28)

Currently,the protocols used for secure information transfer over the Internet are:

(Multiple Choice)
4.8/5
(34)

All of the following are types of information systems general controls except:

(Multiple Choice)
4.9/5
(31)

Your company,an online discount pet supply store,has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year.What is the annual expected loss from this exposure?

(Multiple Choice)
4.8/5
(35)

Which of the following statements about botnets is not true?

(Multiple Choice)
4.9/5
(32)

Most IoT devices support sophisticated security approaches.

(True/False)
4.9/5
(42)

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

(Multiple Choice)
4.8/5
(39)

A computer worm is a program that can copy itself to other computers on the network.

(True/False)
4.9/5
(41)

All of the following are currently being used as traits that can be profiled by biometric authentication except:

(Multiple Choice)
4.7/5
(33)

Which of the following is a type of ambient data?

(Multiple Choice)
5.0/5
(29)

Which of the following statements about Internet security is not true?

(Multiple Choice)
4.9/5
(32)

Smartphones do not have the same security flaws as other Internet-connected devices.

(True/False)
4.8/5
(42)

All of the following have contributed to an increase in software flaws except:

(Multiple Choice)
4.8/5
(35)

As described in the chapter case,which of the following did hackers use to gain access to the Democratic National Committee (DNC)network?

(Multiple Choice)
4.7/5
(33)

Which of the following techniques stops data packets originating outside the organization,inspects them,and passes the packets to the other side of an organization's firewall?

(Multiple Choice)
4.9/5
(43)

The Gramm-Leach-Bliley Act:

(Multiple Choice)
4.9/5
(39)

The Sarbanes-Oxley Act:

(Multiple Choice)
4.9/5
(41)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)