Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Malicious software programs referred to as spyware include a variety of threats such as computer viruses,worms,and Trojan horses.

(True/False)
5.0/5
(40)

Biometric authentication is the use of personal,biographic details such as the high school you attended and the first street you lived on to provide identification.

(True/False)
4.8/5
(36)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.7/5
(31)

Rigorous password systems

(Multiple Choice)
4.9/5
(45)

All of the following are types of information systems general controls except

(Multiple Choice)
4.9/5
(44)

Client software in a client/server environment is specifically vulnerable to

(Multiple Choice)
4.8/5
(33)

Smaller firms may outsource some or many security functions to

(Multiple Choice)
4.9/5
(53)

Which of the following statements about the Internet security is not true?

(Multiple Choice)
4.9/5
(34)

Public key encryption uses two keys.

(True/False)
4.9/5
(35)

Large amounts of data stored in electronic form are ________ than the same data in manual form.

(Multiple Choice)
4.8/5
(29)
Showing 81 - 90 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)