Exam 9: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Firms can enter into a reciprocal agreement with other users of the same type of equipment so that each firm can provide backup to the other in the event of a catastrophe.

(True/False)
4.8/5
(34)

With a Trojan horse, the distribution is accomplished by users who distribute it as a utility.

(True/False)
4.9/5
(41)

The ___________specifies those measures that ensure the safety of employees when disaster strikes.

(Essay)
4.7/5
(39)

Access controls are those built into systems by the system developers during the system development life cycle.

(True/False)
4.8/5
(38)

The ___________is a recommended level of security that in normal circumstances should offer reasonable protection against unauthorized intrusion.

(Essay)
4.8/5
(41)

The final step in writing a risk analysis report should be to document what has been done to mitigate the risk.

(True/False)
4.7/5
(36)

The title of the person who has typically been responsible for the firm's information systems security is the:

(Multiple Choice)
4.8/5
(43)

___________generates intrusive advertising messages.

(Essay)
4.9/5
(36)

When the firm seeks to protect its data and information from disclosure to unauthorized persons, the information security objective is:

(Multiple Choice)
4.7/5
(29)

A virus is a complete program or segment of code that can invade a system and perform functions not intended by the system owners.

(True/False)
4.7/5
(34)

User authorization makes use of access control files that specify the levels of access available to each user.

(True/False)
4.7/5
(36)

The newer title for the information security officer that reports to the CEO and manages an information assurance unit is:

(Multiple Choice)
4.8/5
(34)

A _____________ is a complete computing facility that is made available by a supplier to its customers for use in the event of emergencies.

(Essay)
4.8/5
(32)

The Certified Information Security Manager designation is the newest professional certification for security.

(True/False)
4.8/5
(32)

___________gathers data from the user's machine.

(Essay)
4.8/5
(29)

The access control whereby users verify their right to access by providing something they have or something they are is referred to as:

(Multiple Choice)
4.9/5
(24)

An ___________ is a set of four numbers that uniquely identify each computer connected to the Internet.

(Essay)
5.0/5
(35)

Information security management is the activity of keeping the firm and its information resources functional after a catastrophe.

(True/False)
4.8/5
(31)

When backup service includes a hot site, only the building facilities but not the computing resources are provided.

(True/False)
4.8/5
(26)

Authorization makes use of___________ that specify the levels of access available to each user.

(Essay)
4.8/5
(26)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)