Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Drive-by sniffers monitor and intercept wireless traffic on secured wireless networks.

(True/False)
4.8/5
(32)

________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.

(Multiple Choice)
4.9/5
(36)

Packet-filtering firewalls ________.

(Multiple Choice)
4.9/5
(36)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.8/5
(36)

A ________ examines each part of a message and determines whether to let that part pass.

(Multiple Choice)
5.0/5
(33)

________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

(Multiple Choice)
5.0/5
(35)

Secure Sockets Layer (SSL) is a protocol that is restricted to asymmetric encryption.

(True/False)
4.8/5
(38)

Short passwords with no special characters can make strong passwords.

(True/False)
4.9/5
(38)

One of the personal security safeguards is to use https at trusted, reputable vendors.

(True/False)
4.8/5
(38)

Define threat, vulnerability, safeguard, and target.

(Essay)
4.9/5
(30)

Email spoofing is a synonym for phishing.

(True/False)
4.8/5
(44)

The process of hardening a Web site is a ________ safeguard.

(Multiple Choice)
4.7/5
(42)

Which of the following is considered a computer crime?

(Multiple Choice)
4.8/5
(40)

________ are small files that enables a browser to access Web sites without having to sign in every time.

(Multiple Choice)
4.8/5
(32)

Encryption is an example of a technical safeguard.

(True/False)
5.0/5
(40)

Which of the following is used for biometric authentication?

(Multiple Choice)
4.8/5
(42)

Which of the following statements is True about losses due to computer security threats?

(Multiple Choice)
4.7/5
(40)

In the context of malware protection, the program code that causes the unwanted actions is called the ________.

(Multiple Choice)
4.8/5
(47)

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

(Multiple Choice)
4.7/5
(38)

Which of the following is a sniffing technique?

(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)