Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Robert knows that he got an independent program off of his network on his computer.It deleted all of his spreadsheet files on his hard drive.Robert feels that this problem may have resulted from him opening up an attachment file on his e-mail.Robert is the victim of ________.

(Multiple Choice)
4.8/5
(38)

Computer crime is defined as "any criminal activity involving the copy of,use of,removal of,interference with,access to,manipulation of computer systems,and/or their related functions,data or programs."

(True/False)
4.9/5
(25)

Specific security challenges that threaten the communications lines in a client/server environment include

(Multiple Choice)
4.7/5
(42)

Many Wi-Fi networks can be penetrated easily by intruders using ________ programs to obtain an address to access the resources of a network without authorization.

(Multiple Choice)
5.0/5
(38)

A hacker is an individual who intends to gain unauthorized access to a computer system.

(True/False)
4.9/5
(31)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.9/5
(37)

Businesses must protect not only their own information assets but also those of ________.

(Multiple Choice)
4.9/5
(39)

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.

(Multiple Choice)
4.8/5
(40)

On the whole,________ controls apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.

(Short Answer)
4.8/5
(32)

The most common type of electronic evidence is

(Multiple Choice)
4.7/5
(40)

How do hackers create a botnet?

(Multiple Choice)
4.8/5
(33)

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

(True/False)
4.8/5
(31)

The term ________ is typically used to denote a hacker with criminal intent.

(Short Answer)
4.8/5
(36)

One increasingly popular tactic is a form of spoofing called phishing.

(True/False)
4.7/5
(36)

Computer forensics is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

(True/False)
4.8/5
(38)

Output controls check data for accuracy and completeness when they enter the system.

(True/False)
4.8/5
(36)

Businesses must protect only their own information assets but not those of customers,employees,and business partners.

(True/False)
4.9/5
(40)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.9/5
(36)

Packet filtering catches most types of network attacks.

(True/False)
4.8/5
(39)

Phishing involves

(Multiple Choice)
4.7/5
(36)
Showing 121 - 140 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)