Exam 11: Information Technology It Security
Exam 1: The Evolution of Private Security30 Questions
Exam 2: The Profession30 Questions
Exam 3: The Publicprivate Interface30 Questions
Exam 4: Legal and Ethical Considerations30 Questions
Exam 5: Risk Management the Core of Private Security30 Questions
Exam 6: Enhancing Security Through Physical Controls30 Questions
Exam 7: Enhancing Security Through Procedural Controls30 Questions
Exam 8: Preventing Losses From Accidents and Emergencies30 Questions
Exam 9: Preventing Losses From Criminal Actions30 Questions
Exam 10: When Prevention Fails: Investigating, Reporting and Testifying30 Questions
Exam 11: Information Technology It Security30 Questions
Exam 12: Drugs and Violence in the Workplace30 Questions
Exam 13: Securing the Infrastructure30 Questions
Exam 14: Institutional Security30 Questions
Exam 15: Commercial Security30 Questions
Select questions type
Digital Rights Management (DRM) is __________ technology used by digital copyright owners.
Free
(Short Answer)
4.9/5
(39)
Correct Answer:
anti-piracy
A Trojan horse installs malicious software on a computer.
Free
(True/False)
4.9/5
(41)
Correct Answer:
True
"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.
(True/False)
4.7/5
(39)
Protection provides ___________________ to defend against attacks on assets being secured.
(Short Answer)
4.8/5
(34)
Computer crimes cost __________________________ of dollars annually.
(Short Answer)
5.0/5
(36)
Only the United States government can keep trade secrets through the use of spyware.
(True/False)
4.7/5
(29)
Malicious software or malware is one of the many threats to a computer system.
(True/False)
4.8/5
(28)
Security measures for computer systems include all of the following except
(Multiple Choice)
4.8/5
(30)
___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.
(Short Answer)
4.8/5
(34)
IP video surveillance systems are the most effective way to control a network.
(True/False)
4.8/5
(28)
Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.
(True/False)
4.7/5
(32)
Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.
(Short Answer)
4.8/5
(35)
Security measures for computer systems include all of the following except
(Multiple Choice)
4.8/5
(24)
Common equipment that can pose security threats includes ______, _______ and _________.
(Short Answer)
4.8/5
(38)
The greatest security threats to computer centers include all of the following except
(Multiple Choice)
4.7/5
(38)
Factors to consider in investigating computer crime include all of the following except
(Multiple Choice)
4.9/5
(35)
Telecommunication security information is typically communicated by all of the following except
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)