Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

A keylogger is a type of:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

Which of the following is a type of ambient data?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
5.0/5
(39)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.8/5
(37)

Specific security challenges that threaten the communications lines in a client/server environment include:

(Multiple Choice)
4.8/5
(42)

Hackers create a botnet by:

(Multiple Choice)
5.0/5
(45)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.8/5
(33)

Application controls:

(Multiple Choice)
5.0/5
(33)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.9/5
(36)

Biometric authentication:

(Multiple Choice)
4.9/5
(32)

An independent computer program that copies itself from one computer to another over a network is called a:

(Multiple Choice)
4.7/5
(34)

Phishing is a form of:

(Multiple Choice)
4.9/5
(47)

What is a digital certificate? How does it work?

(Essay)
4.8/5
(36)

Authorization refers to the ability to know that a person is who he or she claims to be.

(True/False)
4.8/5
(44)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.8/5
(40)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:

(Multiple Choice)
4.8/5
(42)

Over 70 percent of malware today is aimed at small businesses.

(True/False)
4.8/5
(39)

Computer worms spread much more rapidly than computer viruses.

(True/False)
4.8/5
(36)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)