Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss some human safeguards for employees that can ensure the security of information systems.

(Essay)
4.8/5
(33)

Which of the following is a critical security function of senior management in an organization?

(Multiple Choice)
4.9/5
(31)

A Trojan horse is a virus that masquerades as a useful program or file.

(True/False)
4.8/5
(42)

It is easy and economical to hold public users of Web sites accountable for security violations.

(True/False)
4.8/5
(40)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.9/5
(34)

Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.

(True/False)
4.9/5
(36)

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

(Multiple Choice)
4.8/5
(38)

________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.

(Multiple Choice)
4.9/5
(35)

A virus is a computer program that replicates itself.The program code that causes unwanted activity is called the ________.

(Multiple Choice)
4.8/5
(30)

Which of the following is true of the Secure Socket Layer (SSL)?

(Multiple Choice)
4.9/5
(40)

Encryption is an example of a technical safeguard.

(True/False)
4.7/5
(34)

________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

(Multiple Choice)
4.8/5
(40)

Data safeguards are measures used to protect computer hardware from external threat.

(True/False)
4.9/5
(45)

________ is the term used to denote viruses, worms and Trojan horses.

(Multiple Choice)
4.8/5
(43)

Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.

(True/False)
4.9/5
(35)

Employee termination is a potential security threat for an organization.

(True/False)
4.8/5
(38)

________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

(Multiple Choice)
4.9/5
(42)

List various personal security safeguards.

(Essay)
4.8/5
(23)

The existence of accounts that are no longer in use are not a security threat to an organization.

(True/False)
4.8/5
(44)

Security policies must not depend on whether the organization is governmental or nongovernmental, or whether it is publically held or private.

(True/False)
4.8/5
(34)
Showing 21 - 40 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)