Exam 12: Information Systems Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a backup of the database contents is made, the database is completely protected.

(True/False)
4.7/5
(33)

With ________, the sender and receiver transmit a message using different keys.

(Multiple Choice)
4.9/5
(36)

Which of the following statements is true about human safeguards for employees?

(Multiple Choice)
4.7/5
(33)

A ________ is a type of virus that propagates using the Internet or other computer networks.

(Multiple Choice)
4.8/5
(42)

The single most important computer security safeguard that can be implemented is to create and use passwords that comprise of names.

(True/False)
4.9/5
(42)

When an employee is terminated, IS administrators should receive advance notice so that they can ________.

(Multiple Choice)
4.8/5
(36)

The security of online transactions has increased with the use of https.

(True/False)
4.8/5
(43)

Describe six malware safeguards.

(Essay)
5.0/5
(31)

As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.

(True/False)
4.9/5
(32)

________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

(Multiple Choice)
5.0/5
(30)

The process of hardening a Web site is a ________ safeguard.

(Multiple Choice)
4.8/5
(38)

Most spyware programs are benign in that they do not perform malicious acts or steal data.

(True/False)
4.8/5
(38)

Hardening is actually a human safeguard.

(True/False)
4.9/5
(36)

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

(Multiple Choice)
4.9/5
(38)

Email spoofing is a synonym for phishing.

(True/False)
4.8/5
(51)

Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.

(Multiple Choice)
4.9/5
(39)

Secure Socket Layer is also known as ________.

(Multiple Choice)
4.9/5
(44)

Encryption is an example of a technical safeguard.

(True/False)
4.8/5
(37)

Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption.

(True/False)
4.7/5
(32)

Drive-by sniffers monitor and intercept wireless traffic at will.

(True/False)
4.8/5
(45)
Showing 41 - 60 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)