Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An intrusion detection system (IDS)is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

(True/False)
4.9/5
(41)

________ present the largest risk for an organization's infrastructure loss.

(Multiple Choice)
4.7/5
(47)

Business requirements do not necessitate opening information systems to nonemployee personnel-temporary personnel, vendors or partner personnel.

(True/False)
4.7/5
(35)

________ involve the people and procedure components of information systems.

(Multiple Choice)
4.8/5
(40)

Cookies enable an individual to access Web sites without having to sign in every time.

(True/False)
4.9/5
(44)

Define threat, vulnerability, safeguard, and target.

(Essay)
4.7/5
(33)

Companies should require vendors and partners to perform appropriate screening and security training.

(True/False)
4.9/5
(40)

A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

(Multiple Choice)
4.9/5
(40)

________ is similar to spyware but it watches user activity and produces pop-ups.

(Multiple Choice)
4.9/5
(30)

Hardening a site means to take extraordinary measures to reduce a system's vulnerability.

(True/False)
4.8/5
(34)

Most emails and IMs are protected by encryption.

(True/False)
4.8/5
(31)

In a study conducted by Verizon, in a year only about a hundred thousand people become victims of computer crimes.

(True/False)
4.8/5
(40)

In a study conducted by Verizon, in 2011, the four most frequent computer crimes involved criminal activity against servers.

(True/False)
5.0/5
(37)

Viruses and worms are examples of malware.

(True/False)
4.7/5
(40)

The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.

(True/False)
4.8/5
(34)

Secure Socket Layer is also known as ________.

(Multiple Choice)
4.7/5
(37)

Which of the following usually happens in a malicious denial-of-service attack?

(Multiple Choice)
4.7/5
(37)

What is meant by denial of service?

(Essay)
4.9/5
(39)

A safety procedure that allows a trusted party to have a copy of the encryption key is called key ________.

(Multiple Choice)
4.8/5
(35)

What is a major difference between spyware and adware?

(Multiple Choice)
4.8/5
(31)
Showing 61 - 80 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)