Exam 9: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of control is recognized as being the best bet for security?

Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
Verified

B

Which type of control establishes codes of conduct, documentation of expected procedures and practices, and monitoring and preventing behavior that varies from the established guidelines?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

A

The term___________ is used to describe the protection of both computer and non- computer equipment, facilities, data, and information from misuse by unauthorized parties.

Free
(Essay)
4.7/5
(32)
Correct Answer:
Verified

information security

Internal threats are considered to present potentially more serious damage than do external threats due to the more intimate knowledge of the system by the internal threats.

(True/False)
4.8/5
(41)

The term that refers to a formal written document that spells out in detail the actions to be taken in the event that there is a disruption, or threat of disruption, in any part of the firm's computing operation is referred to as a(n):

(Multiple Choice)
4.8/5
(35)

Impact severity can be classified as having a major impact when breakdowns that are typical of day- to- day operations occur.

(True/False)
4.7/5
(39)

An information security risk is a person, organization, mechanism, or event that has potential to inflict harm on the firm's information resources.

(True/False)
4.9/5
(41)

Unauthorized use occurs when persons who are not ordinarily entitled to use the firm's resources are able to do so.

(True/False)
4.9/5
(26)

The basis for security against threats by unauthorized persons is physical control.

(True/False)
4.8/5
(43)

The term systems security is used to describe the protection of both computer and noncomputer equipment, facilities, data, and information from misuse by unauthorized parties.

(True/False)
4.8/5
(43)

Formal controls include education and training programs and management development programs in the firm.

(True/False)
4.8/5
(25)

Which of the following set of guidelines places emphasis on the rationale for establishing a security policy and is a product of the U.S. National Research Council?

(Multiple Choice)
4.8/5
(34)

What are the three main objectives that information security is intended to achieve?

(Essay)
4.8/5
(42)

The type of control that includes such activities as instilling the firm's ethical beliefs in its employees, ensuring an understanding of the firm's mission and objectives, education and training programs, and management development programs is referred to as:

(Multiple Choice)
4.9/5
(35)

The SANS Institute offers certifications aimed at such specialties within information security as intrusion detection, firewalls and perimeter protection, and operating system security.

(True/False)
4.8/5
(27)

A ____________ is a computer program that can replicate itself without being observable to the user and embed copies of itself in other programs and boot sectors.

(Essay)
4.8/5
(29)

What acts as a filter and barrier that restricts the flow of data to and from the firm and the Internet?

(Multiple Choice)
4.9/5
(39)

When the level of impact is determined to be minor and the vulnerability is determined to be low, then vulnerability analysis is unnecessary.

(True/False)
4.9/5
(39)

The type of threat whereby the user distributes it as a utility and when used, produces unwanted changes in the system's functionality is called:

(Multiple Choice)
4.9/5
(38)

When a firm follows benchmark compliance, it is assumed that the government and industry authorities have done a good job of considering the threats and risks and that the benchmarks offer good protection.

(True/False)
4.7/5
(36)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)