Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.8/5
(36)

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

(True/False)
4.9/5
(28)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.8/5
(34)

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called

(Multiple Choice)
4.8/5
(34)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Short Answer)
4.8/5
(37)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

(Multiple Choice)
5.0/5
(39)

Pharming involves

(Multiple Choice)
4.8/5
(39)

A(n) ________ examines the firm's overall security environment as well as the controls governing individual information systems.

(Short Answer)
4.9/5
(32)

The Internet poses specific security problems because

(Multiple Choice)
4.8/5
(30)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

(Multiple Choice)
4.9/5
(40)

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.

(Multiple Choice)
4.8/5
(32)

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

(Multiple Choice)
4.8/5
(45)

Which of the following is not one of the main firewall screening techniques?

(Multiple Choice)
4.8/5
(31)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.8/5
(41)

Which of the following is not a trait used for identification in biometric systems?

(Multiple Choice)
4.7/5
(34)

A digital certificate system

(Multiple Choice)
4.9/5
(37)

An example of phishing is

(Multiple Choice)
4.9/5
(37)

Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.

(Short Answer)
4.7/5
(31)

Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used?

(Essay)
4.8/5
(40)

Viruses can be spread through e-mail.

(True/False)
4.9/5
(41)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)