Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________safeguards involve the people and procedure components of information systems.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

Phishing is usually initiated via a(n) __________.

Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Verified

email

If you are a manager, even if they don't tell you about it, one of your overarching concerns is about __________management.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

risk

The Privacy Act of 1974 gives individuals the right to access health data.

(True/False)
4.9/5
(34)

What is risk management? How should management make these tough decisions?

(Essay)
4.9/5
(31)

A _ ___________ is any action, device, procedure, technique, or other measure that reduces a system's security to a threat.

(Short Answer)
4.8/5
(36)

Unauthorized data disclosure can occur by simple human __________when someone inadvertently releases data in violation of a policy.

(Short Answer)
4.8/5
(31)

A hacker can launch a denial of service attack against a Web server by__________ it with millions of bogus service requests.

(Multiple Choice)
4.8/5
(33)

__________is a technique for intercepting computer communications.

(Short Answer)
4.8/5
(40)

A __________ is an operation that spoofs legitimate companies in an attempt to illegally capture credit card or bank account numbers.

(Short Answer)
4.9/5
(40)

You should never send sensitive data over the Internet unless you see https:// in the browser's address bar.

(True/False)
4.8/5
(31)

__________encryption uses the same key for both parties.

(Multiple Choice)
4.8/5
(32)

What is a denial of service security problem? How does this result from actions by the various sources of security threats?

(Essay)
4.9/5
(34)

Security programs have __________components.

(Multiple Choice)
4.7/5
(38)

Pre- texting is the same as__________ in the world of malicious computer activities.

(Short Answer)
4.8/5
(40)

The IT department sets the security policy for an organization.

(True/False)
4.9/5
(38)

Because encryption keys can be lost or destroyed, a copy of the key should stored with a trusted third party called a(n):

(Multiple Choice)
4.8/5
(43)

By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or Web server resulting in a __________.

(Short Answer)
4.7/5
(29)

Technical safeguards involve the hardware and software components of an information system.

(True/False)
4.9/5
(37)

Hardened Web sites use special versions of the operating systems and functions that are not required by the application.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 157
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)