Exam 12: Managing Information Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Care must be taken when terminating employees because they may take harmful and malicious actions.

(True/False)
4.8/5
(43)

A company establishes data rights and responsibilities and educates employees on how to backup and recover the database.But,The company still needs to address the ___________ safeguards.

(Multiple Choice)
4.9/5
(37)

What is meant by the term "malware"? How can we safeguard against it?

(Essay)
4.9/5
(34)

Following a disaster,hot sites provide office space,but customers themselves must come and provide and install the equipment needed to continue operations.

(True/False)
4.8/5
(41)

Organizations should store at least some of the _______________ of the database contents off the premises,possibly in a remote location.

(Multiple Choice)
4.9/5
(36)

Encryption is one of several technical safeguards.

(True/False)
4.7/5
(33)

Security policy establishment is the responsibility of

(Multiple Choice)
4.7/5
(31)

A security incident reporting plan should ________ all incident reports.

(Multiple Choice)
4.8/5
(35)

Backup and recovery,passwords,and encryption are human safeguards.

(True/False)
4.8/5
(41)

After installing anti-virus and antispyware,what is the best way to avoid malware?

(Multiple Choice)
4.7/5
(32)

Adware is ________ than spyware.

(Multiple Choice)
5.0/5
(38)

When an incident is reported,________ is (are)of the essence.

(Multiple Choice)
4.9/5
(43)

When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.

(True/False)
4.8/5
(38)

The popularity and efficacy of search engines like Google have created a source of

(Multiple Choice)
4.8/5
(32)

The best safeguard against a natural disaster is to have a safe location.

(True/False)
4.9/5
(39)

What is pretexting?

(Essay)
4.7/5
(37)

________ considerations should be part of the hiring process.

(Multiple Choice)
4.7/5
(30)

Because they kept giving out passwords to users who claimed to have forgotten them,________ were a serious security risk in the organization.

(Multiple Choice)
4.8/5
(41)

________ is a technique for intercepting computer communications.

(Multiple Choice)
4.9/5
(43)

Unauthorized data disclosure is a major type of security problem.How do the different sources of threats exploit this problem?

(Essay)
4.9/5
(32)
Showing 21 - 40 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)