Exam 12: Information Systems Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?

(Multiple Choice)
4.7/5
(34)

Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.

(True/False)
4.8/5
(33)

What is meant by denial of service?

(Essay)
4.8/5
(37)

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

(Multiple Choice)
4.9/5
(30)

________ is the term used to denote viruses, worms, and Trojan horses.

(Multiple Choice)
4.9/5
(37)

________ present the largest risk for an organization's infrastructure loss.

(Multiple Choice)
4.8/5
(34)

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

(Multiple Choice)
4.9/5
(43)

Define encryption and explain symmetric and asymmetric encryption for computer systems.

(Essay)
4.8/5
(34)

Which of the following usually happens in a malicious denial-of-service attack?

(Multiple Choice)
4.9/5
(40)

________ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time.

(Multiple Choice)
4.9/5
(36)

Data safeguards are measures used to protect computer hardware from external threat.

(True/False)
4.9/5
(36)

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

(Multiple Choice)
4.7/5
(32)

What are spyware and adware programs?

(Essay)
5.0/5
(29)

Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

(Multiple Choice)
4.9/5
(40)

Which of the following statements is true about losses due to computer security threats?

(Multiple Choice)
4.9/5
(42)

Which of the following statements is true of data administration?

(Multiple Choice)
4.9/5
(45)

Which of the following is considered a threat caused by human error?

(Multiple Choice)
5.0/5
(33)

If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.

(True/False)
4.8/5
(42)

A ________ is a number used to encrypt data.

(Multiple Choice)
4.9/5
(36)

Email spoofing is a synonym for ________.

(Multiple Choice)
4.9/5
(28)
Showing 61 - 80 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)