Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In asymmetric encryption, each site has a ________ for encoding messages.

(Multiple Choice)
4.7/5
(37)

The senior management of an organization must establish company-wide security policies.

(True/False)
4.9/5
(31)

Faulty service excludes problems that result due to incorrect data modification.

(True/False)
4.9/5
(44)

A computer crime is committed if an employee inadvertently installs an old database on top of the current one.

(True/False)
4.8/5
(39)

What is meant by denial of service?

(Essay)
4.9/5
(33)

Phishing is a technique for intercepting computer communications.

(True/False)
4.9/5
(36)

When an employee is terminated, IS administrators should receive advance notice so that they can ________.

(Multiple Choice)
4.9/5
(32)

________ involves accomplishing job tasks during failure.

(Multiple Choice)
4.8/5
(43)

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

(Multiple Choice)
4.9/5
(41)

In information security, which of the following is True about managing risk?

(Multiple Choice)
4.9/5
(44)

SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.

(True/False)
4.7/5
(37)

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

(Multiple Choice)
4.9/5
(38)

A Trojan horse is a virus that masquerades as a useful program or file.

(True/False)
4.8/5
(39)

________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access.

(Multiple Choice)
4.8/5
(41)

With ________, the sender and receiver transmit a message using different keys.

(Multiple Choice)
4.7/5
(35)

Discuss some human safeguards for employees that can ensure the security of information systems.

(Essay)
4.8/5
(25)

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

(Multiple Choice)
4.9/5
(39)

The specifics of a security policy should not depend on whether the organization is governmental or nongovernmental, or whether it is publicly held or private.

(True/False)
4.8/5
(32)

________ protect databases and other organizational data.

(Multiple Choice)
4.9/5
(30)

Business requirements do not necessitate opening information systems to nonemployee personnel, such as temporary personnel, vendors, or partner personnel.

(True/False)
4.8/5
(29)
Showing 81 - 100 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)