Exam 12: Information Systems Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the magnitude of security problems in the present day.

(Essay)
4.7/5
(34)

________ are viruses that masquerade as useful programs or files.

(Multiple Choice)
4.8/5
(33)

Unauthorized data disclosures are possible due to human error.

(True/False)
4.8/5
(36)

What is key escrow?

(Essay)
4.9/5
(36)

________ involve the people and procedure components of information systems.

(Multiple Choice)
4.8/5
(30)

It is safer to use the same password for all the Web sites.

(True/False)
4.8/5
(34)

Pretexting occurs when a person receives a confidential text message by mistake.

(True/False)
4.8/5
(33)

A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.

(Multiple Choice)
4.8/5
(39)

Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.

(Multiple Choice)
4.9/5
(41)

Hardening a site means to take extraordinary measures to reduce a system's vulnerability.

(True/False)
5.0/5
(40)

Companies should require vendors and partners to perform appropriate screening and security training.

(True/False)
4.8/5
(35)

A(n) ________ has a microchip in it to hold data.

(Multiple Choice)
4.8/5
(37)

Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

(True/False)
4.9/5
(37)

Unlike credit, debit, and ATM cards, which have a magnetic strip, smart cards have a microchip.

(True/False)
4.9/5
(35)

Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.

(True/False)
5.0/5
(46)

Packet-filtering firewalls ________.

(Multiple Choice)
4.8/5
(38)

Which of the following is an example of a sniffing technique?

(Multiple Choice)
4.8/5
(47)

Which of the following statements is true of biometric identification?

(Multiple Choice)
4.8/5
(33)

In information security, which of the following is true of managing risk?

(Multiple Choice)
4.8/5
(29)

Which of the following statements is true with regard to human safeguards?

(Multiple Choice)
4.9/5
(24)
Showing 21 - 40 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)