Exam 11: Managing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The overarching goal of information security is to ensure data integrity, availability, and confidentiality.

(True/False)
4.9/5
(42)

Describe a VPN and how a VPN can be used for secure organizational communications.

(Essay)
4.8/5
(30)

The trend in computer security is toward policy-based management.

(True/False)
4.9/5
(41)

Identification services can prove that someone was the actual sender of a message.

(True/False)
4.8/5
(32)

Which of the following hacker tricks involves launching software that monitors all traffic looking for passwords or other valuable information?

(Multiple Choice)
4.9/5
(31)

List three requirements noted by Tucker associated with business continuity.

(Essay)
4.8/5
(40)

The security technique that protects information from being seen is known as:

(Multiple Choice)
4.8/5
(46)

To protect against spoofing, firms need a way to:

(Multiple Choice)
4.7/5
(34)

Mobile computing and telecommuting actually decrease the possibility for cybercrime because the greater number of network openings provides more opportunities for law enforcement.

(True/False)
4.7/5
(30)

To protect against hacking, companies install ______ which controls access between networks.

(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)