Exam 9: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not part of the U.S. Government Internet Crime Legislation?

(Multiple Choice)
4.9/5
(44)

List the five phases to developing a security policy.

(Essay)
4.9/5
(27)

The International Standard Organization is a nonprofit organization dedicated to assist computer users with making their systems more secure.

(True/False)
4.9/5
(34)

When the impact severity can cause significant damage and cost but the firm will survive, it is classified as:

(Multiple Choice)
4.8/5
(32)

The contingency plan specifies those measures that ensure the safety of employees when disaster strikes.

(True/False)
4.8/5
(33)

Which one of the following is not a general practice that retailers should follow as identified by Visa?

(Multiple Choice)
4.8/5
(36)

A packet- filtering firewall is the most effective type of firewall.

(True/False)
4.8/5
(36)

In which phase of an information security policy would the project team consult with all interested and affected parties to determine the requirements of the new policy?

(Multiple Choice)
5.0/5
(35)

The organization that aims its certification at intrusion detection, firewall and perimeter protection, and operating system security is the:

(Multiple Choice)
4.8/5
(41)

Insider threat prediction tools have been developed that consider such characteristics as the person 's position in the firm, access to sensitive data, ability to alter hardware components, the types of applications used, the files owned, and the usage of certain network protocols.

(True/False)
4.9/5
(41)

Who is the CIAO and to whom does he or she report?

(Essay)
4.8/5
(34)

A control is a mechanism that is implemented to either protect the firm from risks or to minimize the impact of the risks on the firm should they occur.

(True/False)
4.9/5
(38)

Identification and authentication make use of ___________.

(Essay)
5.0/5
(36)

Identification and authentication make use of___________ , or descriptions of authorized users.

(Essay)
4.9/5
(36)

When the database and software library are made available to persons not entitled to have access, the type of information security risk is:

(Multiple Choice)
4.9/5
(27)

Which of the following is not a step in information security management?

(Multiple Choice)
5.0/5
(30)

The backup plan where hardware, software, and data are duplicated so that when one set is inoperable, the backup set can continue the processing is called redundancy.

(True/False)
4.8/5
(38)

Which type of control is built into systems by the system developers during the system development life cycle?

(Multiple Choice)
4.8/5
(27)

Cryptography is the use of coding by means of mathematical processes.

(True/False)
4.9/5
(37)

Identify the four steps of information security management.

(Essay)
4.7/5
(34)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)