Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

In terms of password management, when an account is created, users should ________.

(Multiple Choice)
4.8/5
(31)

Most secure communications over the Internet use a protocol called ________.

(Multiple Choice)
4.8/5
(35)

Describe how a computer may show signs of spyware and/or adware symptoms.

(Essay)
4.9/5
(39)

Explain the concept of denial of service (DOS) in information management.

(Essay)
4.7/5
(40)

What is one of the drawbacks of removing and disabling cookies?

(Multiple Choice)
4.9/5
(36)

Smart cards are convenient to use because they do not require a personal identification number for authentication.

(True/False)
4.9/5
(39)

Wardrivers are those who engage in phishing to obtain unauthorized access to data.

(True/False)
5.0/5
(42)

A user name authenticates a user, and a password identifies that user.

(True/False)
4.7/5
(38)

Which of the following is the most expensive consequence of computer crime?

(Multiple Choice)
5.0/5
(41)

Pretexting occurs when someone deceives by pretending to be someone else.

(True/False)
4.7/5
(42)

A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.

(Multiple Choice)
4.9/5
(41)

Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.

(True/False)
4.7/5
(43)

Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.

(Multiple Choice)
5.0/5
(40)

A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.

(Multiple Choice)
4.9/5
(43)

Which of the following is a task for the system user during the recovery system procedure?

(Multiple Choice)
4.9/5
(37)

Which of the following statements is TRUE of the financial losses due to computer crimes?

(Multiple Choice)
4.8/5
(35)

Explain the functions performed by packet-filtering firewalls.

(Essay)
4.8/5
(40)

Malware definitions are patterns that exist in malware code.

(True/False)
4.9/5
(34)

Explain the types of events that result in faulty service, a type of security loss.

(Essay)
4.9/5
(44)

________ is a technique for intercepting computer communications.

(Multiple Choice)
4.7/5
(44)
Showing 41 - 60 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)