Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.9/5
(36)

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?

(Multiple Choice)
4.8/5
(32)

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

(True/False)
4.9/5
(38)

Evil twins are

(Multiple Choice)
4.7/5
(37)

Smartphones typically feature state-of-the-art encryption and security features,making them highly secure tools for businesses.

(True/False)
4.8/5
(42)

You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.

(Essay)
4.9/5
(34)

A firewall allows the organization to

(Multiple Choice)
4.8/5
(38)

How is the security of a firm's information system and data affected by its people,organization,and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.9/5
(39)

The Internet poses specific security problems because

(Multiple Choice)
4.8/5
(40)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.7/5
(45)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.

(Multiple Choice)
4.7/5
(40)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.8/5
(37)

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

(Essay)
4.9/5
(42)

A computer virus replicates more quickly than a computer worm.

(True/False)
4.8/5
(41)

The Sarbanes-Oxley Act

(Multiple Choice)
4.7/5
(33)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.8/5
(34)

Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.

(Multiple Choice)
5.0/5
(45)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as

(Multiple Choice)
4.8/5
(38)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.8/5
(38)

A digital certificate system

(Multiple Choice)
4.9/5
(32)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)