Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

(True/False)
4.8/5
(38)

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

(Multiple Choice)
4.8/5
(36)

In a client/server environment, corporate servers are specifically vulnerable to

(Multiple Choice)
4.9/5
(35)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.8/5
(32)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.7/5
(37)

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?

(Multiple Choice)
4.8/5
(30)

The dispersed nature of cloud computing makes it difficult to track unauthorized access.

(True/False)
4.8/5
(36)

The most common type of electronic evidence is

(Multiple Choice)
4.9/5
(30)

Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

(Multiple Choice)
4.7/5
(39)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.9/5
(34)

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

(True/False)
4.9/5
(34)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

(Multiple Choice)
4.7/5
(48)

The intentional defacement or destruction of a Web site is called

(Multiple Choice)
4.9/5
(32)

As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.

(True/False)
4.9/5
(35)

Most antivirus software is effective against

(Multiple Choice)
4.9/5
(31)

The Sarbanes-Oxley Act

(Multiple Choice)
4.8/5
(42)

Rigorous password systems

(Multiple Choice)
4.8/5
(42)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.7/5
(33)

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

(Multiple Choice)
4.9/5
(28)

In 2013, Panda Security reported approximately 30 million new kinds of malware strains.

(True/False)
4.8/5
(38)
Showing 61 - 80 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)