Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.9/5
(45)

What are the security challenges faced by wireless networks?

(Essay)
4.9/5
(38)

Computer forensics tasks include all of the following except

(Multiple Choice)
4.8/5
(46)

The Gramm-Leach-Bliley Act

(Multiple Choice)
4.8/5
(40)

Currently,the protocols used for secure information transfer over the Internet are

(Multiple Choice)
4.8/5
(44)

For 100-percent availability,online transaction processing requires

(Multiple Choice)
4.8/5
(27)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.8/5
(42)

In 2013,Panda Security reported approximately 30 million new kinds of malware strains.

(True/False)
4.8/5
(32)

Viruses can be spread through e-mail.

(True/False)
4.8/5
(32)

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

(Multiple Choice)
4.9/5
(41)

Most antivirus software is effective against

(Multiple Choice)
4.9/5
(34)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

(Multiple Choice)
4.9/5
(43)

You can test software before it is even written by conducting a walkthrough.

(True/False)
4.7/5
(49)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.8/5
(34)

Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.

(True/False)
4.8/5
(42)

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(True/False)
4.8/5
(35)

Authentication refers to verifying that a person is who he or she claims to be.

(True/False)
4.8/5
(36)

Biometric authentication

(Multiple Choice)
4.9/5
(35)

Electronic data are more susceptible to destruction,fraud,error,and misuse because information systems concentrate data in computer files that

(Multiple Choice)
5.0/5
(43)

Packet filtering catches most types of network attacks.

(True/False)
4.8/5
(40)
Showing 61 - 80 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)