Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.8/5
(35)

A ________ is a software program that appears to be benign but then does something other than expected.

(Short Answer)
4.9/5
(30)

What are the security challenges faced by wireless networks?

(Essay)
4.7/5
(39)

A ________ is an individual who intends to gain unauthorized access to a computer system.

(Short Answer)
4.9/5
(29)

________ is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.

(Multiple Choice)
4.9/5
(40)

________ encryption uses two keys: one shared (or public)and one private.

(Short Answer)
4.8/5
(31)

Online transaction processing requires

(Multiple Choice)
4.8/5
(30)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.8/5
(25)

The Melissa worm affected millions of computers worldwide,disrupting British Airways flight check-ins,operations of British Coast Guard stations,Hong Kong hospitals,Taiwan post office branches,and Australia's Westpac Bank.

(True/False)
4.9/5
(40)

The ________ worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book.Infected 15 to 29 percent of all business PCs,causing $300 million to $600 million in damage.

(Short Answer)
4.9/5
(36)

Smartphones share the same ________ weaknesses as other Internet devices and are vulnerable to malicious software and penetration from outsiders.

(Short Answer)
4.7/5
(40)

Fault-tolerant computers contain redundant hardware,software,and power supply components.

(True/False)
4.9/5
(30)

John clicks into his online banking Web site.He is already to type in his password when he notices that something is just not right.Upon further examination he notices that it is not the actual bank site but one that looks almost identical.John was almost a victim of ________.

(Multiple Choice)
4.9/5
(34)

Viruses can be spread through e-mail.

(True/False)
4.8/5
(38)

________ devises plans for the restoration of computing and communications services after they have been disrupted.

(Short Answer)
4.9/5
(45)

A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

(Short Answer)
4.8/5
(42)

Software errors are no threat to information systems,that could cause untold losses in productivity.

(True/False)
4.8/5
(37)

You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.

(Essay)
4.9/5
(33)

Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control.

(Multiple Choice)
4.8/5
(35)

High-availability computing is also referred to as fault tolerance.

(True/False)
4.8/5
(40)
Showing 61 - 80 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)