Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Packet-filtering firewalls are the most sophisticated type of firewall.

(True/False)
4.7/5
(41)

Which of the following is an example of a data safeguard?

(Multiple Choice)
4.8/5
(40)

Which of the following statements is TRUE of position sensitivity?

(Multiple Choice)
4.8/5
(33)

Backup and recovery against computer security threats are ________.

(Multiple Choice)
4.8/5
(30)

Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

(Multiple Choice)
4.9/5
(33)

Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the following techniques is used by Davian to obtain access to his victim's email?

(Multiple Choice)
5.0/5
(42)

In a brute force attack, a password cracker tries every possible combination of characters.

(True/False)
4.9/5
(32)

Currently, which of the following is NOT true about computer crime according to the Ponemon study?

(Multiple Choice)
4.7/5
(38)

________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

(Multiple Choice)
4.7/5
(44)

What are the precautions to be taken when opening email attachments to avoid malwares?

(Essay)
4.9/5
(40)

A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge.

(True/False)
4.8/5
(41)

A virus is a computer program that replicates itself.

(True/False)
4.9/5
(35)

With asymmetric encryption, two different keys are used for encoding and decoding a message.

(True/False)
4.8/5
(25)

Explain how defining positions in an organization can safeguard against security threats.

(Essay)
4.8/5
(43)

The creation of backup copies of database contents makes the data more vulnerable to security threats.

(True/False)
4.8/5
(34)

Incident-response plans should provide centralized reporting of all security incidents.

(True/False)
4.8/5
(42)

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

(Multiple Choice)
4.9/5
(47)

What should a company store off premise preferably in a remote location?

(Multiple Choice)
4.8/5
(35)

________ take computers with wireless connections through an area and search for unprotected wireless networks.

(Multiple Choice)
4.7/5
(34)

Malware protection is an example of a technical safeguard.

(True/False)
4.8/5
(31)
Showing 81 - 100 of 118
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)