Exam 12: Managing Information Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

D

Some of the biggest security threats are from ________ employees.

Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
Verified

B

________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

PIPEDA gives individuals the right to know why an organization is ________ their personal information.

(Multiple Choice)
4.8/5
(32)

People who intentionally gain unauthorized access to computer systems are called hackers.

(True/False)
4.7/5
(38)

The purpose of a(n)________ is to protect databases and other organizational data.

(Multiple Choice)
4.8/5
(42)

A retinal scan would be considered a biometric authentication technique.

(True/False)
4.9/5
(33)

Hardened web sites use special versions of the operating systems and functions that are not required by the application.

(True/False)
4.8/5
(32)

A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.

(Multiple Choice)
4.8/5
(29)

A company should clearly define the security ________ for each position.

(Multiple Choice)
4.9/5
(32)

Denial of service always occurs because of malicious attacks on the system.

(True/False)
4.9/5
(32)

Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.

(True/False)
4.7/5
(40)

Malware is used in denial of service attacks.

(True/False)
4.7/5
(28)

Bloggers have not yet had much of an impact on the main stream media.

(True/False)
4.9/5
(34)

________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.

(Multiple Choice)
4.8/5
(40)

PIPEDA stands for

(Multiple Choice)
4.8/5
(35)

User accounts should be given (the)________ to perform their jobs

(Multiple Choice)
4.9/5
(29)

Most anti-malware programs check e-mail attachments for malware code.

(True/False)
4.8/5
(42)

Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.

(Multiple Choice)
4.7/5
(38)

What is a denial of service security problem? How does this result from actions by the various sources of security threats?

(Essay)
4.8/5
(36)
Showing 1 - 20 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)