Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Email spoofing is a synonym for phishing.

Free
(True/False)
4.9/5
(25)
Correct Answer:
Verified

True

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

Natural disasters present the largest risk for infrastructure loss.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

True

How will computer crime change in the coming years?

(Essay)
4.7/5
(31)

A ________ is a type of virus that self-propagates using the Internet or other computer network.

(Multiple Choice)
4.8/5
(27)

Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.

(True/False)
4.8/5
(28)

The process of hardening a Web site is a ________ safeguard.

(Multiple Choice)
4.9/5
(41)

What is meant by denial of service?

(Essay)
4.8/5
(33)

IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.

(True/False)
5.0/5
(42)

A ________ is a string of bits used to encrypt data.

(Multiple Choice)
4.9/5
(40)

In information security, which of the following is True about managing risk?

(Multiple Choice)
4.9/5
(39)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.9/5
(37)

________ protect databases and other organizational data.

(Multiple Choice)
4.7/5
(46)

Which of the following is a sniffing technique?

(Multiple Choice)
4.8/5
(32)

Phishing is a technique for obtaining unauthorized data that uses pretexting via email.

(True/False)
4.8/5
(28)

Define encryption and explain symmetric and asymmetric encryption for computer systems.

(Essay)
4.7/5
(29)

A(n) ________ has a microchip in it to hold data.

(Multiple Choice)
4.8/5
(38)

Which of the following usually happens in a malicious denial-of-service attack?

(Multiple Choice)
4.8/5
(32)

Which of the following is most likely to be a result of hacking?

(Multiple Choice)
4.9/5
(31)

Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn't believe her manager, and illegally accesses the employee database to look at salary data. Sally's act can be termed as ________.

(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)