Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a virus? Differentiate between Trojan horses and worms.

(Essay)
4.7/5
(42)

________ are false targets for computer criminals to attack.

(Multiple Choice)
4.9/5
(44)

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

(Multiple Choice)
4.7/5
(45)

What are the three general sources of security threats?

(Essay)
4.8/5
(34)

Natural disasters present the largest risk for infrastructure loss.

(True/False)
4.8/5
(32)

In a locked room, maintaining the computers of an organization that run the DBMS is a part of ________.

(Multiple Choice)
4.8/5
(32)

A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.

(Multiple Choice)
5.0/5
(38)

ERP, CRM, and MRP are examples of ________.

(Multiple Choice)
4.8/5
(44)

________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.

(Multiple Choice)
4.9/5
(42)

In asymmetric encryption, each site has a ________ for encoding messages.

(Multiple Choice)
4.9/5
(25)

Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

(Multiple Choice)
4.9/5
(33)

What are spyware and adware programs?

(Essay)
4.9/5
(38)

A ________ examines each part of a message and determines whether to let that part pass.

(Multiple Choice)
4.9/5
(34)

If the incident-response plan is not well prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.

(True/False)
4.7/5
(37)

Technical safeguards involve the hardware and software components of an information system.

(True/False)
4.8/5
(37)

Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.

(True/False)
4.9/5
(45)

If a backup of the database contents is made, the database is protected.

(True/False)
4.9/5
(40)

A magnetic strip holds far more data than a microchip.

(True/False)
4.8/5
(38)

________ are viruses that masquerade as useful programs or files.

(Multiple Choice)
4.8/5
(33)

Define encryption and explain symmetric and asymmetric encryption for computer systems.

(Essay)
4.9/5
(47)
Showing 41 - 60 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)