Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ is a device about the size of a credit card that contains a chip formatted with access permission and other data.

(Short Answer)
4.8/5
(41)

Betty downloaded a peer to peer file sharing program.She is worried that it might have come with spyware attached to it.She had a friend who had a spyware problem where all of her keystrokes were stolen which included her bank passwords.Betty's friend was a victim of ________.

(Multiple Choice)
4.8/5
(39)

Statements ranking information risks and identifying security goals are included in a(n)

(Multiple Choice)
4.9/5
(33)

Evil twins are

(Multiple Choice)
4.9/5
(47)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.9/5
(34)

________ planning focuses on how the company can restore business operations after a disaster strikes.

(Multiple Choice)
4.8/5
(36)

The range of Wi-Fi networks can be extended up to two miles by using external antennae.

(True/False)
4.8/5
(42)

________ also may involve redirecting a Web link to an address different from the intended one,with the site masquerading as the intended destination.

(Short Answer)
4.8/5
(38)

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

(True/False)
4.8/5
(43)

Authentication refers to the ability to know that a person is who he or she claims to be.

(True/False)
4.8/5
(36)

Large public networks,such as the Internet,are more ________ than internal networks because they are virtually open to anyone.

(Short Answer)
4.8/5
(35)

Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers outside the organization's control.

(True/False)
4.8/5
(35)

________ are independent computer programs that copy themselves from one computer to other computers over a network.

(Short Answer)
4.9/5
(34)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.7/5
(40)

An independent computer program that copies itself from one computer to another over a network is called a

(Multiple Choice)
4.8/5
(41)

A ________ is a physical device,similar to an identification card,that is designed to prove the identity of a single user.

(Short Answer)
4.8/5
(34)

________ defects cannot be achieved in larger programs.

(Multiple Choice)
4.8/5
(38)

The Conficker worm uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely.

(True/False)
4.8/5
(34)

The Sasser.ftp worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book.Infected 15 to 29 percent of all business PCs,causing $300 million to $600 million in damage.

(True/False)
4.8/5
(41)

Your company notices that many of its employees peruse face during their day at work.Should your business be concerned? Why?

(Essay)
4.9/5
(27)
Showing 161 - 180 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)