Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the basic information that a security policy must stipulate?

(Essay)
4.7/5
(37)

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

(Multiple Choice)
4.7/5
(36)

Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.

(Multiple Choice)
4.9/5
(33)

________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access.

(Multiple Choice)
4.9/5
(48)

Human error cannot cause unauthorized data disclosure.

(True/False)
4.9/5
(32)

John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility?

(Multiple Choice)
4.8/5
(45)

Which of the following statements is True about the position definitions component of human safeguards?

(Multiple Choice)
4.9/5
(45)

Which of the following is used for biometric authentication?

(Multiple Choice)
4.9/5
(43)

Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.

(True/False)
4.9/5
(35)

Key escrow is a(n) ________.

(Multiple Choice)
4.8/5
(42)

In asymmetric encryption, each site has a ________ for encoding messages.

(Multiple Choice)
4.9/5
(36)

What is a virus? Differentiate between Trojan horses and worms.

(Essay)
4.8/5
(39)

Layla is purchasing a new laptop from an online vendor. Which of the following will be displayed in the address bar of his browser that will let her know that the online retailer is using the Secure Sockets Layer (SSL) protocol?

(Multiple Choice)
4.7/5
(31)

Email spoofing is a synonym for ________.

(Multiple Choice)
4.9/5
(43)

One of the personal security safeguards is to use https at trusted, reputable vendors.

(True/False)
4.9/5
(38)

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

(Multiple Choice)
4.9/5
(32)

Hardening a site means to take extraordinary measures to reduce a system's vulnerability.

(True/False)
4.8/5
(35)

________ involve the people and procedure components of information systems.

(Multiple Choice)
4.7/5
(33)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.

(Multiple Choice)
4.9/5
(34)

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

(Multiple Choice)
4.8/5
(35)
Showing 81 - 100 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)