Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Unauthorized data disclosure is possible due to human error.

(True/False)
4.9/5
(38)

The single most important computer security safeguard that can be implemented is the creation and use of passwords that are comprised of names.

(True/False)
4.8/5
(39)

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system.

(Multiple Choice)
4.8/5
(42)

If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.

(True/False)
4.8/5
(31)

A magnetic strip holds far more data than a microchip.

(True/False)
4.8/5
(30)

The losses due to human error are minimal, and hence, organizations tend to ignore these losses.

(True/False)
4.8/5
(46)

Nonword passwords are vulnerable to brute force attacks.

(True/False)
4.9/5
(36)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.

(Multiple Choice)
4.8/5
(36)

Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.

(True/False)
4.8/5
(37)

It is safe to use the same password for all Web sites.

(True/False)
4.8/5
(41)

Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?

(Multiple Choice)
4.8/5
(30)

What are the three general sources of security threats?

(Essay)
4.9/5
(29)

Biometric authentication uses physical characteristics such as retinal scans to authenticate users.

(True/False)
5.0/5
(40)

Which of the following statements is True about human safeguards for employees?

(Multiple Choice)
4.8/5
(35)

What is key escrow?

(Essay)
4.8/5
(37)

It is easy and economical to hold public users of Web sites accountable for security violations.

(True/False)
4.8/5
(37)

Which of the following is classified as a technical safeguard?

(Multiple Choice)
4.8/5
(40)

Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.

(Multiple Choice)
4.9/5
(46)

The existence of accounts that are no longer in use is not a security threat to an organization.

(True/False)
4.9/5
(44)

Hardening a site means to take extraordinary measures to reduce a system's vulnerability.

(True/False)
4.8/5
(38)
Showing 101 - 120 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)