Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?

(Multiple Choice)
4.9/5
(33)

Large amounts of data stored in electronic form are ________ than the same data in manual form.

(Multiple Choice)
4.9/5
(36)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.9/5
(48)

All of the following are types of information systems general controls except

(Multiple Choice)
4.8/5
(35)

Hackers create a botnet by

(Multiple Choice)
4.9/5
(45)

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.7/5
(42)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of

(Multiple Choice)
4.8/5
(44)

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

(True/False)
4.9/5
(42)

The communications lines in a client/server environment are specifically vulnerable to

(Multiple Choice)
4.8/5
(33)

A computer virus replicates more quickly than a computer worm.

(True/False)
5.0/5
(29)

A foreign country attempting to access government networks in order to disable a national power grid would be an example of

(Multiple Choice)
4.9/5
(41)

What are the security challenges faced by wireless networks?

(Essay)
4.8/5
(48)

Smaller firms may outsource some or many security functions to

(Multiple Choice)
4.8/5
(35)

Organizations can use existing network security software to secure mobile devices.

(True/False)
4.8/5
(44)

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(True/False)
4.8/5
(36)

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

(True/False)
4.7/5
(35)

Application controls

(Multiple Choice)
4.9/5
(36)

Which of the following statements about the Internet security is not true?

(Multiple Choice)
4.9/5
(34)

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.7/5
(48)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.9/5
(37)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)