Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.

(True/False)
4.8/5
(37)

________ enable you to access Web sites without having to sign in every time.

(Multiple Choice)
4.8/5
(29)

When an employee is terminated, IS administrators should receive advance notice so they can ________.

(Multiple Choice)
4.8/5
(32)

Describe six antimalware safeguards.

(Essay)
4.9/5
(38)

How should organizations respond to security incidents?

(Essay)
4.9/5
(39)

When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.

(True/False)
4.8/5
(36)

Which of the following is an example of a sniffing technique?

(Multiple Choice)
4.8/5
(34)

As per the study conducted by Verizon, organizations that have been phished have increased to 40 percent since 2007.

(True/False)
4.9/5
(39)

________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

(Multiple Choice)
4.8/5
(44)

Nonword passwords are vulnerable to a(n)________ attack, in which the password cracker tries every possible combination of characters.

(Multiple Choice)
4.8/5
(39)

Which of the following is considered a computer crime?

(Multiple Choice)
4.9/5
(40)

A computer crime is committed if an employee who inadvertently installs an old database on top of the current one.

(True/False)
4.8/5
(37)

Pretexting occurs when a person receives a confidential text message by mistake and pretends to be the intended recipient.

(True/False)
4.7/5
(31)

Describe the magnitude of security problems in the present day.

(Essay)
4.9/5
(40)

________ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.

(Multiple Choice)
4.9/5
(34)

Users of smart cards are required to enter a ________ to be authenticated.

(Multiple Choice)
4.8/5
(47)

A(n)________ has a microchip in it to hold data.

(Multiple Choice)
4.8/5
(42)

In a study conducted by Verizon, data theft has been most successful at large scale enterprises.

(True/False)
4.8/5
(35)

In context of information security, safeguards increase work efficiency by making common tasks easier.

(True/False)
4.9/5
(45)

Hardening is actually a human safeguard.

(True/False)
4.7/5
(28)
Showing 101 - 120 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)