Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?

Free
(Essay)
4.8/5
(33)
Correct Answer:
Verified

Student answers will vary.Example answers are: Disaster might be the most difficult because it is unexpected,broad-based,and frequently life threatening.In addition,the company cannot know if the disaster plan will work until a disaster occurs,and then it's too late to make corrections.Security might be the most difficult because it is an ongoing problem,new viruses are devised constantly,and hackers get smarter every day.Furthermore,damage done by a trusted employee from inside cannot be obviated by system security measures.Human error might be most difficult because it isn't caught until too late,and the consequences may be disastrous.Also,administrative error can occur at any level and through any operation or procedure in the company.

________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

________ refers to all of the methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its accounting records,and operational adherence to management standards.

Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
Verified

E

Application controls

(Multiple Choice)
4.8/5
(37)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.9/5
(35)

The communications lines in a client/server environment are specifically vulnerable to

(Multiple Choice)
4.9/5
(35)

Pharming involves

(Multiple Choice)
4.9/5
(39)

The intentional defacement or destruction of a Web site is called

(Multiple Choice)
4.8/5
(40)

Social networking sites have become a new conduit for malware because

(Multiple Choice)
4.9/5
(40)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.8/5
(33)

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

(Multiple Choice)
4.8/5
(42)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.

(Multiple Choice)
4.9/5
(36)

In a client/server environment,corporate servers are specifically vulnerable to

(Multiple Choice)
4.9/5
(37)

What is a digital certificate? How does it work?

(Essay)
4.9/5
(39)

An authentication token is a(n)

(Multiple Choice)
4.9/5
(46)

An authentication system in which a user must provide two types of identification,such as a bank card and PIN,is called

(Multiple Choice)
4.8/5
(32)

________ is malware that logs and transmits everything a user types.

(Multiple Choice)
4.8/5
(36)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up.This is an example of

(Multiple Choice)
5.0/5
(39)

Hackers create a botnet by

(Multiple Choice)
4.8/5
(44)

As discussed in the Chapter opening case,magnetic stripes are an old technology that is vulnerable to counterfeit and theft.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)