Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

With HTTPS,data are encrypted using the Secure Socket Layer (SSL)protocol,which is also known as ________.

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

D

In terms of password management,when an account is created,users should ________.

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

B

During which of the following computer crimes does a password cracker try every possible combination of characters?

(Multiple Choice)
4.7/5
(37)

________ are small files that browsers store on users' computers when they visit Web sites.

(Multiple Choice)
4.7/5
(31)

Which of the following is an example of a data safeguard against security threats?

(Multiple Choice)
4.8/5
(35)

Typically,a help-desk information system has answers to questions that only the true or actual user of an account or system would know.

(True/False)
4.8/5
(35)

Smart cards are convenient to use because they don't require a PIN number for authentication.

(True/False)
4.9/5
(39)

Organizations should protect sensitive data by storing it in ________ form.

(Multiple Choice)
4.8/5
(33)

Which of the following statements is true about position sensitivity?

(Multiple Choice)
4.9/5
(33)

A user name authenticates a user,and a password identifies that user.

(True/False)
4.9/5
(34)

What are some of the recommended personal security safeguards against security threats?

(Essay)
4.8/5
(31)

A virus is a computer program that replicates itself.

(True/False)
5.0/5
(28)

________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

(Multiple Choice)
4.8/5
(31)

Explain the concept of denial of service (DOS)in information management.

(Essay)
4.7/5
(43)

A(n)________ is a sophisticated,possibly long-running,computer hack that is perpetrated by large,well-funded organizations like governments.

(Multiple Choice)
4.8/5
(38)

In an organization,the security sensitivity for each position should be documented.

(True/False)
4.8/5
(36)

The existence of accounts that are no longer necessary do not pose any security threats.

(True/False)
4.9/5
(35)

A criticism of biometric authentication is that it provides weak authentication.

(True/False)
4.8/5
(35)

Spoofing is a technique for intercepting computer communications.

(True/False)
5.0/5
(42)
Showing 1 - 20 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)