Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ occurs when someone deceives by pretending to be someone else.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.

Free
(True/False)
4.9/5
(46)
Correct Answer:
Verified

False

Which of the following is most likely to be the result of hacking?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

Biometric authentication uses characteristics such as retinal scans.

(True/False)
4.8/5
(28)

A ________ is a number used to encrypt the data.

(Multiple Choice)
4.9/5
(31)

Secure Socket Layer (SSL)is a protocol that is restricted to asymmetric encryption.

(True/False)
4.8/5
(34)

It is safer to use the same password for all the Web sites.

(True/False)
4.7/5
(27)

________ helps in accomplishing job tasks during failure.

(Multiple Choice)
4.7/5
(31)

Drive-by sniffers monitor and intercept wireless traffic at will.

(True/False)
4.8/5
(23)

________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

(Multiple Choice)
4.8/5
(29)

Unauthorized data disclosures are possible due to human error.

(True/False)
5.0/5
(32)

Email spoofing is a synonym for ________.

(Multiple Choice)
4.7/5
(31)

What is the basic information that a security policy must stipulate?

(Essay)
4.8/5
(43)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal and manipulate data, or other purposes.

(Multiple Choice)
4.8/5
(38)

________ is a staff function to the chief information officer.

(Multiple Choice)
4.9/5
(30)

The Privacy Act of 1974 provides protection to individuals regarding ________.

(Multiple Choice)
4.9/5
(37)

Even short passwords with no special characters can make strong passwords.

(True/False)
4.8/5
(33)

Which of the following statements about human safeguards for employees is true?

(Multiple Choice)
4.7/5
(37)

What is key escrow?

(Essay)
5.0/5
(39)

A new hire must seek out the employer's security policy if it is not discussed in new employee training.

(True/False)
4.8/5
(37)
Showing 1 - 20 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)