Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.7/5
(40)

Packet filtering catches most types of network attacks.

(True/False)
4.8/5
(39)

Which of the following is a type of ambient data?

(Multiple Choice)
4.8/5
(30)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as

(Multiple Choice)
4.9/5
(36)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.8/5
(41)

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(True/False)
4.9/5
(36)

What are the security challenges faced by wireless networks?

(Essay)
4.9/5
(38)

Organizations can use existing network security software to secure mobile devices.

(True/False)
4.8/5
(37)

Viruses can be spread through e-mail.

(True/False)
4.8/5
(38)

Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

(Multiple Choice)
4.9/5
(39)

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

(Multiple Choice)
4.7/5
(35)

A computer virus replicates more quickly than a computer worm.

(True/False)
4.7/5
(39)

Client software in a client/server environment is specifically vulnerable to

(Multiple Choice)
4.9/5
(43)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

(Multiple Choice)
4.7/5
(29)

All of the following are types of information systems general controls except

(Multiple Choice)
4.9/5
(45)

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

(Multiple Choice)
4.8/5
(41)

You can test software before it is even written by conducting a walkthrough.

(True/False)
4.8/5
(31)

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called

(Multiple Choice)
4.8/5
(35)

Hackers create a botnet by

(Multiple Choice)
4.7/5
(39)

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

(Essay)
4.8/5
(41)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)