Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following does not pose a security threat to wireless networks?

(Multiple Choice)
4.8/5
(41)

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.8/5
(40)

The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.

(True/False)
5.0/5
(39)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.8/5
(40)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.9/5
(35)

Evil twins are

(Multiple Choice)
4.8/5
(40)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.8/5
(37)

The most common type of electronic evidence is

(Multiple Choice)
4.8/5
(38)

High-availability computing is also referred to as fault tolerance.

(True/False)
4.9/5
(32)

Hackers create a botnet by

(Multiple Choice)
4.9/5
(35)

On the whole, ________ controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.

(Short Answer)
4.9/5
(38)

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

(Short Answer)
4.8/5
(33)

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.8/5
(33)

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges.

(Essay)
4.8/5
(33)

In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?

(Multiple Choice)
4.8/5
(43)

Packet filtering catches most types of network attacks.

(True/False)
4.8/5
(37)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.8/5
(34)

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.

(Short Answer)
4.9/5
(31)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.9/5
(48)

________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

(Short Answer)
4.9/5
(40)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)