Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most antivirus software is effective against

(Multiple Choice)
4.8/5
(24)

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.

(Multiple Choice)
4.8/5
(46)

A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.

(Multiple Choice)
4.8/5
(36)

Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?

(Multiple Choice)
4.9/5
(43)

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

(True/False)
4.7/5
(43)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.8/5
(40)

Application controls

(Multiple Choice)
4.9/5
(48)

What are the security challenges faced by wireless networks?

(Essay)
4.8/5
(30)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.7/5
(43)

Rigorous password systems

(Multiple Choice)
4.8/5
(34)

A firewall allows the organization to

(Multiple Choice)
5.0/5
(43)

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

(Multiple Choice)
4.8/5
(36)

What is a digital certificate? How does it work?

(Essay)
5.0/5
(42)

For 100% availability, online transaction processing requires

(Multiple Choice)
4.9/5
(31)

A keylogger is a type of

(Multiple Choice)
4.8/5
(42)

An authentication token is a(n)

(Multiple Choice)
4.8/5
(34)

Currently, the protocols used for secure information transfer over the Internet are

(Multiple Choice)
4.8/5
(37)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack.

(Multiple Choice)
4.8/5
(34)

Downtime refers to periods of time in which a

(Multiple Choice)
4.8/5
(31)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.8/5
(35)
Showing 61 - 80 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)