Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The existence of spyware is generally unknown to the user.

(True/False)
5.0/5
(39)

Every organization must have an incident-response plan that allows for decentralized reporting of all security incidents.

(True/False)
4.8/5
(37)

What is the difference between a hot site and a cold site?

(Essay)
4.8/5
(32)

Packet-filtering firewalls examine each part of a message and determine whether to let that part pass.

(True/False)
4.7/5
(38)

________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

(Multiple Choice)
4.7/5
(31)

Which of the following is an example of a data safeguard?

(Multiple Choice)
4.9/5
(31)

List some important malware safeguards.

(Essay)
4.8/5
(36)

Explain how defining positions in an organization can safeguard against security threats.

(Essay)
4.9/5
(37)

Which of the following is a human safeguard against security threats?

(Multiple Choice)
4.8/5
(41)

Enforcement of security procedures and policies consists of three interdependent factors: ________.

(Multiple Choice)
4.7/5
(38)

Once a backup of database contents is made,it is safe to assume that the database is protected.

(True/False)
4.7/5
(47)

Technical safeguards involve just the software components of an information system.

(True/False)
4.9/5
(34)

Malware protection is an example of a technical safeguard.

(True/False)
4.8/5
(42)

Explain denial of service (DOS)in information management.

(Essay)
4.8/5
(35)

________ are remote processing centers run by commercial disaster-recovery services.

(Multiple Choice)
4.8/5
(34)

The program code that causes unwanted activity is called the ________.

(Multiple Choice)
4.8/5
(38)

________ simply take computers with wireless connections through an area and search for unprotected wireless networks.

(Multiple Choice)
4.8/5
(35)

How can data safeguards protect against security threats?

(Essay)
4.8/5
(34)

How is a Trojan horse different from a worm?

(Essay)
4.9/5
(38)

Smart cards are convenient and easy to use since they don't require a PIN number for authentication.

(True/False)
4.8/5
(45)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)