Exam 12: Managing Information Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The sources of security problems are human error, malicious activity, and ________.

(Short Answer)
4.9/5
(36)

PIPEDA stands for

(Multiple Choice)
4.9/5
(36)

What are the three general sources of IS security threats? Which one is the most dangerous? Which one is the easiest to plan for?

(Essay)
4.9/5
(35)

Organizations should store at least some of the ________ of the database contents off the premises, possibly in a remote location.

(Multiple Choice)
4.8/5
(37)

The existence of ________ user accounts is a serious security threat.

(Multiple Choice)
4.7/5
(30)

Despite warnings, users have a tendency to write their passwords on sticky notes next to the computer.

(True/False)
4.8/5
(38)

After installing anti-virus and antispyware, what is the best way to avoid malware?

(Multiple Choice)
4.9/5
(39)

Firewalls produce ________ of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access.

(Multiple Choice)
4.9/5
(33)

An organization's security ________ has three components: senior management involvement, safeguards, and an incident response.

(Short Answer)
4.7/5
(43)

To protect against lost or sabotaged encryption keys, a trusted party should keep a copy of the key.

(True/False)
4.8/5
(37)

A(n) ________ must be entered when using a smart card in order to provide authentication.

(Short Answer)
4.9/5
(39)

Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party called a(n)

(Multiple Choice)
4.9/5
(45)

A retinal scan would be considered a biometric authentication technique.

(True/False)
5.0/5
(33)

Unauthorized data disclosure can occur by simple human ________ when someone inadvertently releases data in violation of a policy.

(Short Answer)
4.9/5
(43)

What is the idea of a single sign-on for multiple systems? What are the benefits and negatives associated with single sign-on?

(Essay)
4.8/5
(40)

Sometimes, just opening a webpage can install ________ on your computer.

(Short Answer)
4.7/5
(40)

A hacker can launch a denial-of-service attack against a web server by ________ it with millions of bogus service requests.

(Multiple Choice)
4.8/5
(37)

According to PIPEDA, every organization needs to identify anyone in the organization who is responsible for ________ personal information.

(Multiple Choice)
4.9/5
(36)

________ considerations should be part of the hiring process.

(Multiple Choice)
5.0/5
(32)

Biometric authentication has been around for some time, and because of weaknesses is not likely to see much usage in the future.

(True/False)
4.8/5
(33)
Showing 41 - 60 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)