Exam 12: Managing Information Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Spoofing is a technique for intercepting computer communications.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

A(n) ________ card has a microchip on it that is loaded with identifying data.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

A

Backup and recovery, passwords, and encryption are human safeguards.

Free
(True/False)
4.7/5
(39)
Correct Answer:
Verified

False

Technical safeguards involve the hardware and software components of an information system.

(True/False)
4.7/5
(34)

User accounts should be given (the) ________ to perform their jobs.

(Multiple Choice)
4.9/5
(29)

Passwords have weaknesses because users often choose simple passwords, which ________ systems can easily guess.

(Multiple Choice)
4.8/5
(37)

If you ever receive notification that your password has been reset when you did not request a reset, immediately contact your IS department.

(True/False)
4.9/5
(32)

Since most organizations are protected by a(n) ________, it is not surprising that most viruses spread via email.

(Multiple Choice)
4.9/5
(25)

________ are the primary means of authentication.

(Multiple Choice)
4.9/5
(43)

Some new operating systems offer a feature called ________, which remembers your data once you enter it the first time and authenticates you to other machines in the network.

(Short Answer)
4.8/5
(40)

When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial-of-service attack.

(True/False)
4.8/5
(39)

By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or web server resulting in a(n) ________.

(Short Answer)
4.7/5
(39)

Enforcement consists of ________ interdependent factors.

(Multiple Choice)
4.8/5
(36)

Hardened websites use special versions of the operating systems and functions that are not required by the application.

(True/False)
4.7/5
(27)

Adware is ________ than spyware.

(Multiple Choice)
4.9/5
(32)

Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization.

(Multiple Choice)
4.8/5
(38)

Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.

(True/False)
4.7/5
(34)

In order to intercept communications on ________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections.

(Multiple Choice)
5.0/5
(35)

Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.

(Multiple Choice)
4.8/5
(31)

A computer ________ is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic.

(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)