Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ present(s) the largest risk for an organization's infrastructure loss.

(Multiple Choice)
4.9/5
(31)

Which of the following is considered a computer crime?

(Multiple Choice)
4.9/5
(41)

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.

(Multiple Choice)
4.8/5
(30)

Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________.

(Multiple Choice)
4.8/5
(38)

________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

(Multiple Choice)
4.9/5
(39)

Which of the following statements is True about losses due to computer security threats?

(Multiple Choice)
5.0/5
(29)

________ are small files that enables a browser to access Web sites without having to sign in every time.

(Multiple Choice)
4.8/5
(35)

Faulty service excludes problems that result due to incorrect data modification.

(True/False)
4.9/5
(43)

A denial-of-service attack is launched when a hacker takes computers with wireless connections through an area and searches for unprotected wireless networks.

(True/False)
4.9/5
(39)

Which of the following statements is True about the Secure Sockets Layer (SSL)?

(Multiple Choice)
4.8/5
(33)

________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.

(Multiple Choice)
4.7/5
(39)

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

(Multiple Choice)
4.9/5
(33)

Biometric authentication uses physical characteristics such as retinal scans to authenticate users.

(True/False)
4.7/5
(36)

Symmetric encryption is simpler and much faster than asymmetric encryption.

(True/False)
4.7/5
(48)

What are the three general sources of security threats?

(Essay)
4.7/5
(38)

A ________ examines each part of a message and determines whether to let that part pass.

(Multiple Choice)
4.7/5
(35)

If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.

(True/False)
4.9/5
(39)

Which of the following is considered a threat caused by human error?

(Multiple Choice)
4.8/5
(41)

Sarah was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Sarah's system is ________.

(Multiple Choice)
4.9/5
(38)

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)