Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

While making online purchases, a person should buy only from vendors who support https.

(True/False)
4.9/5
(39)

Incorrectly increasing a customer's discount is an example of incorrect data modification.

(True/False)
4.8/5
(41)

Which is NOT an example of a natural disaster?

(Multiple Choice)
4.9/5
(35)

________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.

(Multiple Choice)
5.0/5
(47)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.8/5
(38)

Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.

(True/False)
4.8/5
(35)

What are the two critical security functions that an organization's senior management needs to address?

(Essay)
4.9/5
(40)

Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

(Multiple Choice)
4.9/5
(43)

There are standards to assist a company in determining the loss if a computer crime occurs.

(True/False)
4.8/5
(34)

A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

(Multiple Choice)
4.7/5
(39)

A ________ is a plastic card that has a microchip loaded with identifying data.

(Multiple Choice)
4.8/5
(44)

Which of the following type of password guidelines are the easiest to crack?

(Multiple Choice)
4.9/5
(32)

Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.

(True/False)
4.8/5
(44)

What are some of the recommended personal security safeguards against security threats?

(Essay)
4.8/5
(36)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

(Multiple Choice)
4.8/5
(39)

Existence of accounts that are no longer necessary does not pose a security threat.

(True/False)
4.9/5
(44)

Viruses, worms, and Trojan horses are types of firewalls.

(True/False)
4.9/5
(35)

Technical safeguards include encryption and usage of passwords.

(True/False)
4.9/5
(36)

Explain the functions of the two organizational units responsible for data safeguarding.

(Essay)
4.7/5
(36)

In an organization, security sensitivity for each position should be documented.

(True/False)
4.9/5
(42)
Showing 61 - 80 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)