Exam 11: Managing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Defining security policies and then centrally managing and enforcing those policies via security management products and services is known as:

(Multiple Choice)
4.7/5
(40)

A malicious program can be housed inside an innocent program that appears to be helpful.

(True/False)
4.8/5
(26)

The top security concern among all organizations is:

(Multiple Choice)
5.0/5
(37)

Which of the following areas are considered important to maintaining a safe computing environment?

(Multiple Choice)
4.9/5
(31)

List four common profiles of an "insider" criminal.

(Essay)
4.7/5
(43)

Which of the following hacker tricks involves placing oneself between two communicating parties and either substituting one's own information in place of one of the parties' information or denying one party access to a session?

(Multiple Choice)
4.8/5
(27)

Computer attacks by insiders can be among the most expensive and most damaging security treats.

(True/False)
4.8/5
(44)

Security is often thought by many to be a(n):

(Multiple Choice)
4.9/5
(42)

A certificate is a mechanism to verify an identity on a computer system over a computer network.

(True/False)
4.8/5
(37)

The security technique used to protect systems against sniffing is called:

(Multiple Choice)
4.8/5
(33)

List five areas exposed to threats and vulnerabilities where security must be applied.

(Essay)
4.9/5
(42)

Nonrepudiation is moving toward application-level security, requiring authentication for each application a user wants to access.

(True/False)
4.9/5
(32)

List five steps that can be taken to protect from credit card fraud.

(Essay)
4.8/5
(34)

The security technique that prevents parties from denying actions they have taken is known as:

(Multiple Choice)
4.9/5
(46)

Which of the following hacker tricks involves flooding a Web site, with so much useless traffic that the site becomes overwhelmed and freezes?

(Multiple Choice)
4.9/5
(37)

The most common public key encryption method is:

(Multiple Choice)
4.8/5
(39)

________ remain the source of the largest financial losses.

(Multiple Choice)
4.7/5
(37)

An estimation by the Computer Security Institute suggests that losses caused by insider attacks account for between________ percent of the entire organization's losses related to computer crimes.

(Multiple Choice)
4.8/5
(35)

Memory management, access to I/O devices, file management, and hardware configuration are all examples of:

(Multiple Choice)
4.9/5
(31)

Managing security refers to a comprehensive set of activities that develop, implement, direct, and monitor the organization's security strategy and activities.

(True/False)
4.7/5
(35)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)