Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Senior management has two critical security functions: overall policy and risk management.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

Organizations should protect sensitive data by storing it in ________ form.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

C

Most secure communication over the Internet uses a protocol called HTTP.

Free
(True/False)
4.8/5
(25)
Correct Answer:
Verified

False

What are firewalls? What types of firewalls are commonly used?

(Essay)
4.7/5
(28)

The existence of accounts that are no longer necessary do not pose a serious security threat.

(True/False)
4.9/5
(24)

Discuss in brief the pros and cons of biometric authentication.

(Essay)
4.8/5
(27)

A(n)________ card has a microchip on it that is loaded with identifying data.

(Multiple Choice)
4.9/5
(28)

Which of the following steps of the Secure Socket Layer is NOT true?

(Multiple Choice)
4.9/5
(29)

Most spyware is benign in that it does not perform malicious acts or steal data.

(True/False)
4.8/5
(36)

Internal firewalls sit outside the organizational network.

(True/False)
4.8/5
(25)

Which of the following is an example of a security threat resulting from malicious human activity?

(Multiple Choice)
4.7/5
(31)

What is the difference between adware and spyware?

(Essay)
4.8/5
(40)

What should an organization do when a security breach occurs in its information systems?

(Essay)
4.8/5
(41)

Perimeter firewalls are the simplest type of firewalls.

(True/False)
5.0/5
(36)

Which of the following are malware masquerading as useful programs?

(Multiple Choice)
4.7/5
(37)

Differentiate between symmetric and asymmetric encryption.

(Essay)
4.7/5
(46)

Explain account management.

(Essay)
5.0/5
(36)

What are the three interdependent factors involved in the enforcement of security policies and procedures?

(Essay)
4.7/5
(30)

Denial-of-service attacks are caused by human error,not malicious intent.

(True/False)
4.9/5
(35)

Mark recently received an email from what appeared to be a legitimate company,asking him to update and verify his credit card details.Unknowingly,he obliged and later realized that the information had been misused.Mark is a victim of ________.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)