Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Popular IM applications for consumers ________ use a secure layer for text messages,so they can be intercepted and read by outsiders during transmission over the public Internet.

(Multiple Choice)
4.8/5
(34)

Define a fault-tolerant computer system and a high-availability computer system.How do they differ? When would each be used?

(Essay)
4.8/5
(34)

Pharming redirects users to a bogus Web page,even when the individual types the correct Web page address into his or her browser.

(True/False)
4.8/5
(35)

Rigorous password systems

(Multiple Choice)
4.9/5
(41)

The ________ worm affected millions of computers worldwide,disrupting British Airways flight check-ins,operations of British Coast Guard stations,Hong Kong hospitals,Taiwan post office branches,and Australia's Westpac Bank.

(Short Answer)
5.0/5
(33)

Computer worms spread much more rapidly than computer viruses.

(True/False)
4.8/5
(31)

In a ________,hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network.

(Short Answer)
4.7/5
(43)

The Cornflicker worm was first identified in January 2007.It spreads via e-mail spam with a fake attachment.Infected up to 10 million computers,causing them to join its zombie network of computers engaged in criminal activity.

(True/False)
4.9/5
(44)

Phishing is a form of

(Multiple Choice)
4.8/5
(34)

________ injection attacks are the largest malware threat,their attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company's systems and networks.

(Multiple Choice)
4.8/5
(39)

You have been hired as a security consultant for a legal firm.Which of the following constitutes the greatest threat,in terms of security,to the firm?

(Multiple Choice)
4.8/5
(42)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Short Answer)
4.9/5
(40)

Growing complexity and size of software programs,coupled with demands for timely delivery to markets,have contributed to an increase in software ________ or vulnerabilities.

(Short Answer)
5.0/5
(42)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack.

(Multiple Choice)
4.9/5
(45)

Electronic data are more susceptible to destruction,fraud,error,and misuse because information systems concentrate data in computer files that

(Multiple Choice)
4.7/5
(33)

Malicious software programs are referred to as ________.

(Short Answer)
4.7/5
(31)

A ________ system uses a trusted third party,known as a certificate authority (CA),to validate a user's identity.

(Short Answer)
4.9/5
(44)

Specific security challenges that threaten clients in a client/server environment include

(Multiple Choice)
4.8/5
(43)

The development and use of methods to make computer systems recover more quickly after mishaps is called

(Multiple Choice)
4.8/5
(40)

Large public networks,such as the Internet,are less vulnerable than internal networks because they are virtually open to anyone.

(True/False)
5.0/5
(44)
Showing 21 - 40 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)