Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following focuses primarily on the technical issues of keeping systems up and running?

(Multiple Choice)
4.8/5
(33)

What is the role of an information systems audit?

(Essay)
4.9/5
(42)

Evil twins are:

(Multiple Choice)
4.7/5
(48)

A Trojan horse:

(Multiple Choice)
4.9/5
(34)

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

(Multiple Choice)
4.9/5
(38)

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

(Multiple Choice)
4.8/5
(45)

Pharming involves:

(Multiple Choice)
4.9/5
(34)

Which of the following is an example of a keylogger?

(Multiple Choice)
4.7/5
(41)

Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.

(Multiple Choice)
4.8/5
(31)

How does disaster recovery planning differ from business continuity planning?

(Essay)
4.9/5
(35)

A computer virus replicates more quickly than a computer worm.

(True/False)
4.8/5
(45)

DoS attacks flood a network server with thousands of requests for service.

(True/False)
4.8/5
(37)

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

(Multiple Choice)
4.9/5
(32)

Which of the following refers to all of the methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its accounting records,and operational adherence to management standards?

(Multiple Choice)
4.8/5
(41)

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

(True/False)
4.9/5
(38)

Packet filtering catches most types of network attacks.

(True/False)
4.8/5
(36)

What are the security challenges faced by wireless networks?

(Essay)
4.7/5
(32)

When a hacker discovers a security hole in software that is unknown to the software vendor,it is an example of:

(Multiple Choice)
4.9/5
(36)

The HIPAA Act of 1996:

(Multiple Choice)
4.9/5
(34)

A statement ranking information risks and identifying security goals would be included in which of the following?

(Multiple Choice)
4.8/5
(39)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)