Exam 12: Managing Information Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Operating systems today have the capability to ________ users to multiple networks and servers.

(Short Answer)
4.9/5
(44)

Most anti-malware programs check email attachments for malware code.

(True/False)
4.8/5
(35)

With wired networks, sniffing requires a(n) ________ connection to the network.

(Short Answer)
4.9/5
(39)

What is spoofing?

(Essay)
4.8/5
(45)

Be sure to purchase your antispyware program from a(n) ________ vendor because some free programs in the past were actually malware programs in disguise.

(Multiple Choice)
4.8/5
(33)

________, which are the patterns that exist in malware code, should be downloaded and updated frequently.

(Multiple Choice)
4.8/5
(41)

________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.9/5
(34)

People who intentionally gain unauthorized access to computer systems are called hackers.

(True/False)
5.0/5
(31)

The popularity and efficacy of search engines like Google have created a source of

(Multiple Choice)
4.7/5
(30)

Unauthorized data disclosure is a major type of security problem. How do the different sources of threats exploit this problem?

(Essay)
4.9/5
(46)

A company should clearly define the security ________ for each position.

(Multiple Choice)
4.9/5
(44)

Denial of service always occurs because of malicious attacks on the system.

(True/False)
4.9/5
(36)

When an employee is terminated, system administrators should receive advance notice so they can

(Multiple Choice)
4.8/5
(36)

Fingerprints and facial features are used to provide authentication for ________ security devices.

(Short Answer)
4.9/5
(34)

Care must be taken when terminating employees because they may take harmful and malicious actions.

(True/False)
4.8/5
(29)

Phishing is usually initiated via a(n) ________.

(Short Answer)
4.8/5
(33)

What is pretexting?

(Essay)
4.8/5
(34)

A security incident reporting plan should ________ all incident reports.

(Multiple Choice)
4.9/5
(30)

________ is a technique for intercepting computer communications.

(Multiple Choice)
5.0/5
(30)

Organizations should protect sensitive data by storing it in ________ form.

(Multiple Choice)
4.7/5
(40)
Showing 21 - 40 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)