Exam 11: Managing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A common credit card fraud is called:

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

A

List five fundamental pillars that make up all security countermeasures and techniques.

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

1. Authentication. Verifying the authenticity of users
2. Identification. Identifying users to grant them appropriate access
3. Privacy. Protecting information from being seen
4. Integrity. Keeping information in its original form
5. Nonrepudiation. Preventing parties from denying actions they have taken

Which of the following strategies involves creating a culture for enforcing IT security?

Free
(Multiple Choice)
4.7/5
(47)
Correct Answer:
Verified

B

The most expensive cybercrime are computer viruses.

(True/False)
4.9/5
(41)

Name five types of security threats.

(Essay)
4.7/5
(40)

Virtual Private Networks are hardware or software that controls access between networks.

(True/False)
4.9/5
(43)

Describe the management/business issues around both business continuity and IT disaster recovery.

(Essay)
4.8/5
(37)

Biometrics are the most widely used security technology.

(True/False)
4.9/5
(41)

For digital signatures to work, a trusted third party must issue the keys to individuals and firms.

(True/False)
4.8/5
(37)

What is a digital certificate?

(Essay)
4.8/5
(35)

Hacker tools are becoming increasingly sophisticated and easier to use allowing hackers to outsmart the countermeasures used by companies to protect themselves.

(True/False)
4.9/5
(37)

Authentication is a means of providing proof of data transmission or receipt so that the occurrence of a transaction cannot later be refused.

(True/False)
4.9/5
(38)

Vein-viewing technology can be used to replace signatures, keys, and passwords.

(True/False)
4.8/5
(42)

Business continuity is a(n):

(Multiple Choice)
4.8/5
(30)

The core challenge of security management is:

(Multiple Choice)
4.8/5
(43)

A common profile of an insider criminal is a poor performance review.

(True/False)
4.8/5
(32)

Describe three steps required for an organization to develop and information-centric security strategy.

(Essay)
4.7/5
(34)

The Internet does not have intrinsic security protocols.

(True/False)
4.8/5
(36)

All business executives need to understand threats and countermeasures and continually fund security work to protect their businesses.

(True/False)
4.8/5
(35)

Tunneling creates a temporary connection between to remote computer which blocks access to anyone trying to intercept messages sent over that link.

(True/False)
4.8/5
(39)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)