Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

B

The Sarbanes-Oxley Act

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

PKI is the use of public key cryptography working with a(n) ________.

Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Verified

certificate authority

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

(Multiple Choice)
4.8/5
(34)

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.8/5
(42)

Phishing is a form of

(Multiple Choice)
4.8/5
(47)

________ refers to the ability to know that a person is who he or she claims to be.

(Short Answer)
4.7/5
(40)

Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?

(Multiple Choice)
4.8/5
(40)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.8/5
(50)

In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.

(True/False)
4.8/5
(32)

Public key encryption uses two keys.

(True/False)
4.8/5
(35)

The range of Wi-Fi networks can be extended up to two miles by using external antennae.

(True/False)
4.8/5
(36)

An independent computer program that copies itself from one computer to another over a network is called a

(Multiple Choice)
4.8/5
(35)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.7/5
(21)

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of

(Multiple Choice)
4.7/5
(37)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.8/5
(22)

DoS attacks are one of the most economically damaging kinds of computer crime.

(True/False)
4.8/5
(32)

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

(Multiple Choice)
4.8/5
(34)

The HIPAA Act of 1997

(Multiple Choice)
4.8/5
(38)

Smaller firms may outsource some or many security functions to

(Multiple Choice)
4.8/5
(49)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)