Exam 4: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake.

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

B

If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

Judith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of _____________.

(Multiple Choice)
4.8/5
(33)

Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors.

(True/False)
4.8/5
(40)

Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks.

(True/False)
4.9/5
(39)

The external audit of information systems is frequently a part of the overall external auditing performed by a CPA firm.

(True/False)
4.7/5
(30)

You are a computer programmer who feels short-changed by your organization. To get back at them, you would most likely use a Trojan horse, back door, or logic bomb.

(True/False)
4.9/5
(41)

___ allows everything to run unless it is on the list.

(Short Answer)
4.7/5
(32)

___ refers to all the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

(Short Answer)
4.8/5
(25)

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

(Multiple Choice)
4.8/5
(32)

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.

(Multiple Choice)
4.7/5
(35)

Dumpster diving is always theft and is always illegal.

(True/False)
4.8/5
(34)

The 2017 Equifax data breach occurred because attackers _______.

(Multiple Choice)
4.8/5
(36)

___ are small amounts of information that websites store on your computer, temporarily or more or less permanently.

(Short Answer)
4.9/5
(30)

Auditing _________ the computer means auditors check inputs, outputs, and processing.

(Multiple Choice)
5.0/5
(28)

_________ causes pop-up advertisements to appear on your screen.

(Multiple Choice)
4.9/5
(30)

The goal of whaling is to trick a(n) _______ into revealing personal or corporate data.

(Multiple Choice)
4.7/5
(34)

XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?

(Multiple Choice)
4.7/5
(38)

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 169
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)