Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cookies enable an individual to access Web sites without having to sign in every time.

Free
(True/False)
4.9/5
(43)
Correct Answer:
Verified

True

What is a virus? Differentiate between Trojan horses and worms.

Free
(Essay)
4.7/5
(34)
Correct Answer:
Verified

A virus is a computer program that replicates itself.
•Trojan horses are viruses that masquerade as useful programs or files.
•A worm is a virus that self-propagates using the Internet or other computer network.

What are spyware and adware programs?

Free
(Essay)
4.8/5
(34)
Correct Answer:
Verified

•Spyware programs are installed on the user's computer without the user's knowledge or permission.Spyware resides in the background and, unknown to the user, observes the user's actions and keystrokes, monitors computer activity, and reports the user's activities to sponsoring organizations.Some malicious spyware, called key loggers, captures keystrokes to obtain user names, passwords, account numbers, and other sensitive information.
•Adware is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior.Most adware is benign in that it does not perform malicious acts or steal data.It does, however, watch user activity and produce pop-up ads.Adware can also change the user's default window or modify search results and switch the user's search engine.

Key escrow is a(n) ________.

(Multiple Choice)
4.9/5
(36)

A new hire must seek out the employer's security policy if it is not discussed in new-employee training.

(True/False)
4.9/5
(33)

________ occurs when someone deceives by pretending to be someone else.

(Multiple Choice)
4.8/5
(40)

Describe six malware safeguards.

(Essay)
4.8/5
(35)

The best personal security safeguard is to remove browsing history, temporary files, and cookies from the computer and to set the browser to disable history and cookies.

(True/False)
4.9/5
(35)

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

(Multiple Choice)
4.9/5
(27)

Most emails and IMs are protected by encryption.

(True/False)
4.9/5
(39)

Companies must establish security policies and procedures for the termination of employees.

(True/False)
4.8/5
(38)

Companies should require vendors and partners to perform appropriate screening and security training.

(True/False)
4.8/5
(41)

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.

(Multiple Choice)
5.0/5
(32)

Define encryption and explain symmetric and asymmetric encryption for computer systems.

(Essay)
4.8/5
(37)

________ are false targets for computer criminals to attack.

(Multiple Choice)
4.8/5
(39)

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

(Multiple Choice)
4.8/5
(43)

Which of the following is a personal security safeguard?

(Multiple Choice)
4.8/5
(38)

________ involve the people and procedure components of information systems.

(Multiple Choice)
4.8/5
(33)

Describe the magnitude of security problems in the present day.

(Essay)
4.9/5
(37)

Data safeguards protect computer hardware from external threat.

(True/False)
4.9/5
(45)
Showing 1 - 20 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)