Exam 12: Information Systems Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Biometric authentication uses physical characteristics such as retinal scans to authenticate users.

(True/False)
4.9/5
(37)

________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

(Multiple Choice)
4.9/5
(34)

In the context of information security, safeguards increase work efficiency by making common tasks easier.

(True/False)
4.9/5
(38)

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

(Multiple Choice)
4.9/5
(41)

What is the basic information that a security policy must stipulate?

(Essay)
4.8/5
(39)

An Advanced Persistent Threat (APT) is a sophisticated computer hack that is perpetrated by large, well-funded organizations such as governments.

(True/False)
4.9/5
(37)

Which of the following is classified as a technical safeguard?

(Multiple Choice)
5.0/5
(41)

In asymmetric encryption, each site has a ________ for encoding messages.

(Multiple Choice)
4.7/5
(43)

________ are false targets for computer criminals to attack.

(Multiple Choice)
4.9/5
(28)

The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.

(True/False)
5.0/5
(32)

________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.

(Multiple Choice)
4.7/5
(39)

Symmetric encryption is simpler and much faster than asymmetric encryption.

(True/False)
4.7/5
(45)

Nonword passwords are also vulnerable to brute force attacks.

(True/False)
4.8/5
(43)

What is a virus? Differentiate between Trojan horses and worms.

(Essay)
4.8/5
(38)

________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.

(Multiple Choice)
4.9/5
(33)

Employee termination is a potential security threat for an organization.

(True/False)
4.9/5
(38)

Specific security policies should not depend on whether the organization is governmental or nongovernmental or whether it is publicly held or private.

(True/False)
4.7/5
(30)

Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.

(True/False)
4.8/5
(37)

A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

(Multiple Choice)
4.9/5
(36)

A computer crime is committed if an employee inadvertently installs an old database on top of the current one.

(True/False)
4.9/5
(35)
Showing 81 - 100 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)