Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A foreign country attempting to access government networks in order to disable a national power grid would be an example of:

(Multiple Choice)
4.8/5
(29)

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

(Multiple Choice)
4.9/5
(33)

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.8/5
(31)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.7/5
(30)

A digital certificate system:

(Multiple Choice)
4.8/5
(45)

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

(True/False)
4.9/5
(36)

Smaller firms may outsource some or many security functions to:

(Multiple Choice)
4.9/5
(28)

Viruses can be spread through e-mail.

(True/False)
4.8/5
(45)

To secure mobile devices, a company will need to implement special mobile device management software.

(True/False)
4.9/5
(36)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

(Multiple Choice)
4.9/5
(38)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.9/5
(46)

In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.

(True/False)
4.9/5
(28)

Public key encryption uses two keys.

(True/False)
4.9/5
(33)

Computer forensics tasks include all of the following except:

(Multiple Choice)
5.0/5
(39)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.8/5
(35)

The Internet poses specific security problems because:

(Multiple Choice)
4.8/5
(34)

Pharming involves:

(Multiple Choice)
4.8/5
(28)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

(Multiple Choice)
4.9/5
(35)

Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.

(Essay)
4.9/5
(38)

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

(True/False)
4.8/5
(37)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)