Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The HIPAA Act of 1996:

(Multiple Choice)
4.9/5
(30)

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

(Multiple Choice)
5.0/5
(38)

All of the following are types of information systems general controls except:

(Multiple Choice)
4.8/5
(41)

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?

(Multiple Choice)
4.9/5
(44)

An example of phishing is:

(Multiple Choice)
4.8/5
(36)

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

(Multiple Choice)
4.7/5
(43)

Specific security challenges that threaten corporate servers in a client/server environment include:

(Multiple Choice)
4.9/5
(38)

The most common type of electronic evidence is:

(Multiple Choice)
4.9/5
(38)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:

(Multiple Choice)
4.9/5
(44)

An authentication token is a(n):

(Multiple Choice)
4.9/5
(31)

The Gramm-Leach-Bliley Act:

(Multiple Choice)
4.7/5
(43)

Redirecting a Web link to a different address is a form of:

(Multiple Choice)
4.9/5
(33)

Most antivirus software is effective against:

(Multiple Choice)
4.8/5
(38)

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.9/5
(37)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.8/5
(40)

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

(Multiple Choice)
4.7/5
(41)

Large amounts of data stored in electronic form are ________ than the same data in manual form.

(Multiple Choice)
4.9/5
(32)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.9/5
(43)

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:

(Multiple Choice)
4.7/5
(39)

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(True/False)
4.8/5
(39)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)