Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is true regarding an incident-response plan?

(Multiple Choice)
4.8/5
(43)

Following a disaster,hot sites provide office space,but customers themselves must provide and install the equipment needed to continue operations.

(True/False)
4.8/5
(37)

An employee carelessly releases proprietary data to the media.This is a case of ________ resulting from ________.

(Multiple Choice)
4.8/5
(29)

Incorrectly increasing a customer's discount is an example of incorrect data modification.

(True/False)
4.7/5
(33)

________ occurs when a person gains unauthorized access to a computer system.

(Multiple Choice)
4.9/5
(35)

A(n)________ sits outside the organizational network and is the first device that Internet traffic encounters.

(Multiple Choice)
4.8/5
(39)

Sniffing is usually initiated via email.

(True/False)
4.7/5
(41)

In terms of password management,when an account is created,users should ________.

(Multiple Choice)
4.8/5
(41)

A user name ________ a user.

(Multiple Choice)
4.7/5
(35)

A password ________ a user.

(Multiple Choice)
4.9/5
(31)

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

(Multiple Choice)
4.8/5
(37)

Activity log analysis is an important ________ function.

(Multiple Choice)
4.9/5
(34)

Users of smart cards are required to enter a ________ to be authenticated.

(Multiple Choice)
4.9/5
(40)

Every organization should have a(n)________ as part of the security program,which should include how employees are to react to security problems,whom they should contact,the reports they should make,and steps they can take to reduce further loss.

(Multiple Choice)
4.8/5
(38)

In the context of human safeguards against security threats,the security sensitivity for each position should be documented.

(True/False)
4.8/5
(42)

The broadest definition of ________ includes viruses,worms,Trojan horses,spyware,and adware.

(Multiple Choice)
4.7/5
(45)

Technical safeguards include passwords and encryption.

(True/False)
4.8/5
(35)

A problem in a customer billing system that occurs due to errors made during software installation is a case of ________ resulting from ________.

(Multiple Choice)
4.8/5
(32)

Which of the following is a technical safeguard against security threats?

(Multiple Choice)
4.8/5
(44)

Which of the following is a synonym for phishing?

(Multiple Choice)
4.9/5
(33)
Showing 61 - 80 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)