Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A fixed Internet address creates a ________ target for hackers.

(Short Answer)
4.8/5
(41)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

(Multiple Choice)
4.8/5
(36)

Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without ________.

(Short Answer)
4.8/5
(31)

Public key encryption uses two keys.

(True/False)
4.8/5
(31)

Sobig.F and MyDoom.A are

(Multiple Choice)
4.8/5
(37)

Currently,the protocols used for secure information transfer over the Internet are

(Multiple Choice)
4.8/5
(36)

Disaster recovery planning devises plans for the restoration of computing and communications services before they have been disrupted.

(True/False)
4.8/5
(42)

________ govern the design,security,and use of computer programs and the security of data files throughout the organization's IT infrastructure.

(Multiple Choice)
4.9/5
(33)

Many firms are reluctant to spend heavily on security because it is not directly related to ________.

(Multiple Choice)
4.9/5
(41)

A ________ determines the level of risk to the firm if a specific activity or process is not properly controlled.

(Short Answer)
4.8/5
(34)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.9/5
(35)

Bob wants to use encryption tools in his firm but he is not sure if he should use public key or private key encryption.He really doesn't understand the differences between the two.Describe the two types of encryption for Bob.

(Essay)
4.8/5
(38)

Sally is the CEO of a chain of health clinics in Ontario.She is growing more and more concerned about the security of records in her company.She is wondering about the legal and regulatory requirements for electronic record management in Canada.What would you advise Sally about the legal and regulatory requirements for electronic record management in Canada?

(Essay)
4.7/5
(34)

Downtime refers to periods of time in which a

(Multiple Choice)
4.8/5
(32)

A Trojan horse is a software program that appears threatening but is really benign.

(True/False)
4.9/5
(47)

A ________ is a rogue software program that attaches itself to other software programs or data files in order to be executed,usually without user knowledge or permission.

(Short Answer)
4.7/5
(31)

Most antivirus software is effective against

(Multiple Choice)
4.8/5
(35)

________ is tricking people into revealing their passwords or other information by pretending to be legitimate users or members of a company in need of information.

(Short Answer)
4.8/5
(43)

________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.

(Multiple Choice)
4.8/5
(40)

________ refers to policies,procedures,and technical measures used to prevent unauthorized access,alternation,theft,or physical damage to information systems.

(Multiple Choice)
4.8/5
(36)
Showing 141 - 160 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)