Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One aspect of security programs is how an organization establishes____________ that provide checks and balances for the people in charge of sensitive data and applications.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

controls

When an employee notices a virus on his machine,the___________plan should specify what to do.

Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
Verified

E

Hardened web sites use special versions of the operating systems and functions that are not required by the application.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

Fingerprints and facial features are used to provide authentication for_________security devices.

(Short Answer)
4.8/5
(42)

___________occurs when a person gains unauthorized access to a computer system.

(Short Answer)
4.8/5
(39)

The best safeguard against a natural disaster is to have a safe location.

(True/False)
4.9/5
(32)

Since most organizations are protected by a(n)___________spread via e -mail.

(Multiple Choice)
4.8/5
(30)

Unauthorized data disclosure is a major type of security problem.How do the different sources of threats exploit this problem?

(Essay)
4.7/5
(32)

A company should clearly define the security__________for each position.

(Multiple Choice)
4.8/5
(34)

PIPEDA stands for of all employees.

(Multiple Choice)
4.7/5
(40)

When an incident is reported____________is (are) of the essence

(Multiple Choice)
4.7/5
(35)

Because Microsoft employs hundreds of programmers from around the world in writing its operating systems,they must have careful procedures for___________what code gets in.

(Multiple Choice)
4.9/5
(39)

The purpose of a(n)____________is to protect databases and other organizational data.

(Multiple Choice)
4.9/5
(32)

What is the idea of a single sign -on for multiple systems? What are the benefits and negatives associated with single -sign on?

(Essay)
4.9/5
(38)

A retinal scan would be considered a biometric authentication technique.

(True/False)
4.7/5
(40)

Users should be given (the)_________ _to perform their jobs

(Multiple Choice)
4.7/5
(38)

What is pretexting?

(Essay)
4.8/5
(38)

___________safeguards involve the people and procedure components of information systems.

(Multiple Choice)
4.8/5
(27)

Malware protection is an example of a technical safeguard.

(True/False)
4.8/5
(30)

A(n)___________is someone who pretends to be a legitimate company and sends e -mail requesting confidential data.

(Multiple Choice)
4.7/5
(36)
Showing 1 - 20 of 115
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)