Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ occur when bogus services flood a Web server.

(Multiple Choice)
4.9/5
(34)

Viruses,worms,and Trojan horses are types of firewalls.

(True/False)
4.8/5
(42)

________ use(s)personal physical characteristics such as fingerprints,facial features,and retinal scans to verify users.

(Multiple Choice)
4.8/5
(46)

Because encryption keys can get lost or destroyed,a copy of the key should be stored with a trusted third party.This safety procedure is sometimes called ________.

(Multiple Choice)
4.8/5
(30)

Typically,a help-desk information system has answers to questions that only a true user would know,such as the user's birthplace,mother's maiden name,or last four digits of an important account number.This information ________.

(Multiple Choice)
4.9/5
(36)

Distinguish between phishing,spoofing,and sniffing.

(Essay)
4.8/5
(46)

System errors are not caused by human error.

(True/False)
4.9/5
(33)

________ are the patterns that exist in malware code and should be downloaded and updated frequently.

(Multiple Choice)
4.9/5
(42)

Creating backup copies of database contents is a technical safeguard.

(True/False)
4.7/5
(34)

Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.

(Multiple Choice)
4.9/5
(32)

Pretexting occurs when someone deceives by pretending to be someone else.

(True/False)
4.7/5
(36)

Backup procedures for system users include backing up Web site resources,databases,administrative data,account and password data,and other data.

(True/False)
4.9/5
(38)

A person calls the Draper residence and pretends to represent a credit card company.He asks Mrs.Draper to confirm her credit card number.This is an example of ________.

(Multiple Choice)
5.0/5
(29)

Which of the following statements is true regarding position sensitivity?

(Multiple Choice)
4.8/5
(36)

________ is a technique for intercepting computer communications.

(Multiple Choice)
4.8/5
(44)

________ firewalls can prohibit outsiders from starting a session with any user behind the firewall.

(Multiple Choice)
4.9/5
(35)

________ is an example of a data safeguard against security threats.

(Multiple Choice)
4.9/5
(34)

What is the similarity between adware and spyware?

(Multiple Choice)
4.7/5
(30)

Describe an incident-response plan.

(Essay)
4.8/5
(43)

A criticism against biometric authentication is that it provides weak authentication.

(True/False)
4.9/5
(33)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)