Exam 25: Valuing and Storing Organizational Informationdatabases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?

(Multiple Choice)
4.7/5
(33)

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

(Multiple Choice)
4.8/5
(40)

Describe the relationship between information security policies and an information security plan.

(Essay)
4.9/5
(32)

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

(True/False)
4.9/5
(34)

What is pretexting?

(Multiple Choice)
4.9/5
(40)

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

(Multiple Choice)
4.7/5
(40)

Phishing reroutes requests for legitimate websites to false websites.

(True/False)
4.7/5
(40)

Organizations address security risks through two lines of defense. The first is people and the second is technology.

(True/False)
4.8/5
(33)

What is an insider?

(Multiple Choice)
4.8/5
(39)

The most secure procedures combine which of the following authentication and authorization techniques?

(Multiple Choice)
4.9/5
(29)

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.

(True/False)
4.8/5
(36)

A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software, and can act as ________.

(Multiple Choice)
4.8/5
(42)

What is spear phishing?

(Multiple Choice)
4.9/5
(30)

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

(True/False)
4.8/5
(31)

Single-factor authentication is the traditional security process, which requires a username and password.

(True/False)
4.8/5
(31)

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?

(Multiple Choice)
4.8/5
(30)

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success. What type of authentication technique is VeriSign providing for CheckMD?

(Multiple Choice)
4.9/5
(35)

Worms are computer viruses that wait for a specific date before executing their instructions.

(True/False)
4.8/5
(41)

Which of the following represents the three areas where technology can aid in the defense against information security attacks?

(Multiple Choice)
4.7/5
(31)

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?

(Multiple Choice)
4.8/5
(44)
Showing 81 - 100 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)