Exam 12: Managing Information Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Technical safeguards involve the hardware and software components of an information system.

(True/False)
4.8/5
(39)

Hardening is actually a(n)________ safeguard.

(Multiple Choice)
4.7/5
(43)

If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with

(Multiple Choice)
4.7/5
(34)

What is a technical safeguard? Describe two of these.

(Essay)
4.8/5
(35)

Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.

(True/False)
4.8/5
(40)

Spoofing is a technique for intercepting computer communications.

(True/False)
4.7/5
(33)

Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.

(True/False)
4.8/5
(41)

Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.

(Multiple Choice)
4.8/5
(42)

Organizations should protect sensitive data by storing it in ________ form.

(Multiple Choice)
4.9/5
(37)

What are the three general sources of IS security threats? Which one is the most dangerous? Which one is the easiest to plan for?

(Essay)
4.9/5
(34)

What is spoofing?

(Essay)
5.0/5
(39)

What is the idea of a single sign-on for multiple systems? What are the benefits and negatives associated with single-sign on?

(Essay)
5.0/5
(24)

About ninety percent of all viruses are spread via

(Multiple Choice)
4.8/5
(34)

Help desks have not been the source of many security problems in the past.

(True/False)
4.9/5
(27)

Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.

(Multiple Choice)
4.8/5
(35)

________,which are the patterns that exist in malware code,should be downloaded and updated frequently.

(Multiple Choice)
4.8/5
(37)

A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.

(Multiple Choice)
4.7/5
(35)

A(n)________ card has a microchip on it that is loaded with identifying data.

(Multiple Choice)
4.9/5
(31)

What is phishing?

(Essay)
5.0/5
(38)

Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.

(Multiple Choice)
4.9/5
(32)
Showing 41 - 60 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)