Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ________ worm was first identified in January 2007.It spreads via e-mail spam with a fake attachment.Infected up to 10 million computers,causing them to join its zombie network of computers engaged in criminal activity.

(Multiple Choice)
4.9/5
(32)

A computer bacteria is a rogue software program that attaches itself to other software programs or data files in order to be executed,usually without user knowledge or permission.

(True/False)
4.9/5
(38)

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

(True/False)
4.7/5
(42)

________ controls establish that data are complete and accurate during updating.

(Short Answer)
4.8/5
(51)

Social Bookmarking is tricking people into revealing their passwords or other information by pretending to be legitimate users or members of a company in need of information.

(True/False)
5.0/5
(39)

Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?

(Essay)
4.9/5
(45)

Pharming involves

(Multiple Choice)
4.9/5
(26)

________ examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet,examining individual packets in isolation.

(Short Answer)
5.0/5
(35)

________ redirects users to a bogus Web page,even when the individual types the correct Web page address into his or her browser.

(Short Answer)
4.8/5
(31)

Many firms spend heavily on security because it is directly related to sales revenue.

(True/False)
4.9/5
(46)

Jimmy Clark is sitting home one night and is very bored.He gets on his computer and starts to surf the net.He comes to a military site.He thinks he might be able to get around the security of the site and into the military computer system.He spends the next two hours trying to find his way into their system.Jimmy is ________.

(Multiple Choice)
4.9/5
(31)

________ refers to the ability to know that a person is who he or she claims to be.

(Short Answer)
4.9/5
(37)

________ consists of all the policies and procedures a company uses to prevent improper entry to systems by unauthorized insiders and outsiders.

(Short Answer)
4.9/5
(34)

Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control.

(Short Answer)
4.9/5
(44)

When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called ________.

(Short Answer)
4.9/5
(48)

Why is software quality important to security.What specific steps can an organization take to ensure software quality?

(Essay)
4.8/5
(42)

________ feature full-time monitoring tools placed at the most vulnerable points or "hot spots" of corporate networks to detect and deter intruders continually.

(Short Answer)
4.9/5
(37)

An MIS audit examines the firm's overall security environment as well as controls governing individual information systems.

(True/False)
5.0/5
(34)

Redirecting a Web link to a different address is a form of

(Multiple Choice)
4.7/5
(39)

________ computer systems contain redundant hardware,software,and power supply components that create an environment that provides continuous,uninterrupted service.

(Short Answer)
4.8/5
(35)
Showing 101 - 120 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)