Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.9/5
(41)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.9/5
(38)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.9/5
(37)

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.9/5
(36)

A digital certificate system

(Multiple Choice)
4.9/5
(37)

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

(Multiple Choice)
4.9/5
(42)

Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.

(Essay)
4.9/5
(30)

A firewall allows the organization to

(Multiple Choice)
4.8/5
(28)

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.8/5
(47)

Evil twins are

(Multiple Choice)
4.9/5
(42)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.9/5
(39)

Currently, the protocols used for secure information transfer over the Internet are

(Multiple Choice)
4.7/5
(35)

The HIPAA Act of 1996

(Multiple Choice)
4.7/5
(41)

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

(Multiple Choice)
4.9/5
(43)

Pharming involves

(Multiple Choice)
4.8/5
(26)

Statements ranking information risks and identifying security goals are included in a(n)

(Multiple Choice)
4.9/5
(45)

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
5.0/5
(40)

The Internet poses specific security problems because

(Multiple Choice)
4.9/5
(35)

Public key encryption uses two keys.

(True/False)
4.8/5
(40)

Social networking sites have become a new conduit for malware because

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)