Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

(True/False)
4.9/5
(45)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as ________.

(Short Answer)
4.7/5
(37)

The Gramm-Leach-Bliley Act

(Multiple Choice)
4.9/5
(43)

Both software metrics and software testing are techniques used to improve software quality.

(True/False)
4.8/5
(35)

Computer worms spread much more rapidly than computer viruses.

(True/False)
4.9/5
(41)

Redirecting a Web link to a different address is a form of

(Multiple Choice)
4.9/5
(37)

Which of the following statements about the Internet security is not True?

(Multiple Choice)
4.8/5
(32)

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

(Multiple Choice)
4.8/5
(37)

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.9/5
(34)

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?

(Multiple Choice)
4.9/5
(40)
Showing 81 - 90 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)