Exam 25: Valuing and Storing Organizational Informationdatabases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

(True/False)
4.8/5
(36)

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?

(Multiple Choice)
4.9/5
(38)

A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.

(True/False)
4.8/5
(39)

Information security policies detail how an organization will implement the information security plan.

(True/False)
4.8/5
(31)

What decodes information?

(Multiple Choice)
4.9/5
(33)

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.9/5
(31)

What is it called when a hacker looks through your trash to find personal information?

(Multiple Choice)
4.9/5
(28)

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

(Multiple Choice)
4.7/5
(35)

What is a masquerading attack that combines spam with spoofing?

(Multiple Choice)
5.0/5
(46)

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

(True/False)
4.8/5
(36)

What is dumpster diving?

(Multiple Choice)
4.8/5
(31)

Which of the following is considered a type of biometrics?

(Multiple Choice)
4.7/5
(40)

What area of information security focuses on preventing identity theft, phishing, and pharming scams?

(Multiple Choice)
4.9/5
(25)

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

(True/False)
4.7/5
(32)

Which of the below represents the biggest problem of information security breaches?

(Multiple Choice)
4.8/5
(35)

What requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?

(Multiple Choice)
4.9/5
(23)

The best and most effective way to manage authentication is through ________.

(Multiple Choice)
4.8/5
(27)

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

(True/False)
4.9/5
(32)

What must you do with antivirus software to make it protect effectively?

(Multiple Choice)
4.8/5
(33)

Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that this may be caused by an internal employee. He needs to clarify and establish what type of plan to help reduce further problems?

(Multiple Choice)
4.8/5
(27)
Showing 41 - 60 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)