Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The loss of encryption keys by employees is referred to as key escrow.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

Spyware programs are installed on a user's computer without the user's knowledge.

Free
(True/False)
4.7/5
(43)
Correct Answer:
Verified

True

A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

B

The Grey-Sloan hospital was attached by a virus. The interns should check the ________ for next steps.

(Multiple Choice)
4.8/5
(30)

A(n) ________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.

(Multiple Choice)
4.8/5
(38)

Companies that spend more time on safeguards experience less computer crime.

(True/False)
4.8/5
(34)

Adware and spyware are similar to each other in that they both ________.

(Multiple Choice)
4.9/5
(29)

Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

(Multiple Choice)
4.9/5
(29)

Hiring, training, and educating employees in an organization is a technical safeguard.

(True/False)
4.9/5
(46)

Jack installed the incorrect security patch on the server. This is an example of what type of security problem?

(Multiple Choice)
5.0/5
(40)

Financial institutions must invest heavily in security safeguards because they are obvious targets for theft.

(True/False)
4.9/5
(28)

Which of the following is considered a personal security safeguard?

(Multiple Choice)
4.8/5
(34)

What human safeguards should be taken against security threats for temporary personnel, vendors, and partner personnel?

(Essay)
4.8/5
(30)

A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.

(Multiple Choice)
4.7/5
(35)

A help-desk information system has answers to questions that only a true user of an account or system would know.

(True/False)
4.9/5
(45)

Discuss briefly the pros and cons of biometric authentication.

(Essay)
4.9/5
(37)

The specifics of a policy depend on whether the organization is governmental or nongovernmental.

(True/False)
4.7/5
(41)

Which of the following is a data safeguard against security threats?

(Multiple Choice)
4.9/5
(28)

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

(Multiple Choice)
4.9/5
(32)

In the case of public key encryption, each site has a private key to encode a message and a public key to decode it.

(True/False)
4.8/5
(34)
Showing 1 - 20 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)