Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An acceptable use policy defines the acceptable level of access to information assets for different users.

Free
(True/False)
4.9/5
(43)
Correct Answer:
Verified

False

________ is malware that logs and transmits everything a user types.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

Computer forensics tasks include all of the following except

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.8/5
(30)

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

(True/False)
4.9/5
(37)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

(Multiple Choice)
4.9/5
(41)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

(Multiple Choice)
4.8/5
(40)

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

(True/False)
4.8/5
(38)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.8/5
(34)

An authentication token is a(n)

(Multiple Choice)
5.0/5
(39)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as

(Multiple Choice)
4.7/5
(42)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.9/5
(40)

Viruses can be spread through e-mail.

(True/False)
4.7/5
(46)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.9/5
(39)

Packet filtering catches most types of network attacks.

(True/False)
4.9/5
(45)

For 100-percent availability, online transaction processing requires

(Multiple Choice)
4.8/5
(40)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

(Multiple Choice)
4.9/5
(35)

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called

(Multiple Choice)
4.9/5
(40)

What is a digital certificate? How does it work?

(Essay)
4.8/5
(41)

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)