Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL) protocol?

(Multiple Choice)
4.9/5
(41)

Most spyware programs are benign in that they do not perform malicious acts or steal data.

(True/False)
4.8/5
(37)

An Advanced Persistent Threat (APT) is a sophisticated computer hack that is perpetrated by large, well-funded organizations such as governments.

(True/False)
4.8/5
(46)

Users of smart cards are required to enter a ________ to be authenticated.

(Multiple Choice)
4.8/5
(47)

As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.

(True/False)
4.8/5
(41)

________ are viruses that masquerade as useful programs or files.

(Multiple Choice)
4.8/5
(42)

How should organizations respond to security incidents?

(Essay)
4.9/5
(37)

Which of the following statements is True about biometric identification?

(Multiple Choice)
4.9/5
(30)

Which of the following usually happens in a malicious denial-of-service attack?

(Multiple Choice)
5.0/5
(35)

Email spoofing is a synonym for ________.

(Multiple Choice)
5.0/5
(41)

Which of the following is a critical security function that should be addressed by the senior management of an organization?

(Multiple Choice)
4.8/5
(35)

Technical safeguards involve the hardware and software components of an information system.

(True/False)
4.8/5
(48)

Secure Sockets Layer is also known as ________.

(Multiple Choice)
4.8/5
(36)

________ is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior.

(Multiple Choice)
4.9/5
(28)

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

(Multiple Choice)
4.7/5
(29)

Natural disasters present the largest risk for infrastructure loss.

(True/False)
4.9/5
(39)

Which of the following statements is True about data administration?

(Multiple Choice)
4.7/5
(39)

A denial-of-service attack is launched when a hacker floods a Web server with millions of bogus service requests.

(True/False)
4.8/5
(34)

Malware is a broad category of software that includes viruses, spyware and adware.

(True/False)
4.8/5
(32)

Which of the following is most likely to be a result of hacking?

(Multiple Choice)
4.8/5
(40)
Showing 61 - 80 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)