Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

(Multiple Choice)
4.8/5
(34)

Most emails and IMs are protected by encryption.

(True/False)
4.8/5
(41)

Which of the following is a critical security function that should be addressed by the senior management of an organization?

(Multiple Choice)
4.8/5
(31)

Users of smart cards are required to enter a ________ to be authenticated.

(Multiple Choice)
4.8/5
(41)

Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?

(Multiple Choice)
4.8/5
(40)

A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________.

(Multiple Choice)
5.0/5
(26)

A magnetic strip holds far more data than a microchip.

(True/False)
4.8/5
(39)

Describe the magnitude of security problems in the present day.

(Essay)
4.7/5
(39)

________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments.

(Multiple Choice)
4.7/5
(43)

Secure Sockets Layer is also known as ________.

(Multiple Choice)
4.7/5
(37)

When an employee is terminated, IS administrators should receive advance notice so that they can ________.

(Multiple Choice)
5.0/5
(38)

Discuss some human safeguards for employees that can ensure the security of information systems.

(Essay)
4.8/5
(25)

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system.

(Multiple Choice)
4.9/5
(31)

PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, attempts to fix the damage by retrieving information from backed up data. George is involved in the process of ________.

(Multiple Choice)
4.8/5
(39)

What are spyware and adware programs?

(Essay)
4.8/5
(40)

Describe the difference between a perimeter firewall and an internal firewall?

(Essay)
4.9/5
(40)

A computer crime is committed if an employee inadvertently installs an old database on top of the current one.

(True/False)
4.8/5
(33)

Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________.

(Multiple Choice)
5.0/5
(40)

Define pretexting, phishing, spoofing, and sniffing.

(Essay)
4.8/5
(35)

Which of the following statements is True about data administration?

(Multiple Choice)
4.9/5
(42)
Showing 41 - 60 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)