Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With ________ encryption, the sender and receiver transmit a message using the same key.

(Multiple Choice)
4.8/5
(43)

In symmetric encryption, two different keys are used to encode and decode a message.

(True/False)
4.9/5
(40)

Phishing is a technique for intercepting computer communications.

(True/False)
4.9/5
(42)

Which of the following statements is true of biometric identification?

(Multiple Choice)
4.8/5
(41)

________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.

(Multiple Choice)
4.7/5
(37)

The process of hardening is actually a ________ safeguard.

(Multiple Choice)
4.8/5
(32)

Most spyware programs are benign in that they do not perform malicious acts or steal data.

(True/False)
4.8/5
(32)

Which of the following is considered a threat caused by human error?

(Multiple Choice)
5.0/5
(39)

An SQL ________ occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.

(Multiple Choice)
4.9/5
(31)

________ protect databases and other organizational data.

(Multiple Choice)
4.7/5
(42)

Symmetric encryption is simpler and much faster than asymmetric encryption.

(True/False)
4.9/5
(38)

Brute force requires only 2 days to crack a password having a mixture of upper and lowercase letters, numbers, and special characters.

(True/False)
4.9/5
(39)

Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

(True/False)
4.9/5
(41)

A ________ is a type of virus that propagates using the Internet or other computer networks.

(Multiple Choice)
4.7/5
(29)

Which of the following is used for biometric authentication?

(Multiple Choice)
4.8/5
(37)

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

(Multiple Choice)
4.9/5
(36)

You are transferring funds online through the Web site of a reputed bank.Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?

(Multiple Choice)
4.7/5
(38)

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.This is done to achieve ________.

(Multiple Choice)
4.8/5
(29)

Which of the following systems procedures is specifically the responsibility of operations personnel?

(Multiple Choice)
4.9/5
(45)

Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.

(True/False)
4.9/5
(41)
Showing 81 - 100 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)