Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The dispersed nature of cloud computing makes it difficult to track unauthorized access.

(True/False)
4.8/5
(43)

Which of the following statements about the Internet security is not true?

(Multiple Choice)
4.8/5
(42)

A Trojan horse

(Multiple Choice)
5.0/5
(38)

The intentional defacement or destruction of a Web site is called

(Multiple Choice)
4.9/5
(41)

The HIPAA Act of 1996

(Multiple Choice)
4.8/5
(33)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.8/5
(35)

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

(True/False)
4.7/5
(33)

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.8/5
(35)

Large amounts of data stored in electronic form are ________ than the same data in manual form.

(Multiple Choice)
4.7/5
(26)

Public key encryption uses two keys.

(True/False)
4.9/5
(42)

For 100-percent availability, online transaction processing requires

(Multiple Choice)
5.0/5
(43)

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

(True/False)
4.8/5
(45)

Most antivirus software is effective against

(Multiple Choice)
4.8/5
(33)

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

(Multiple Choice)
4.8/5
(36)

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?

(Multiple Choice)
4.9/5
(40)

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.7/5
(35)

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.7/5
(42)

Currently, the protocols used for secure information transfer over the Internet are

(Multiple Choice)
4.9/5
(34)

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?

(Multiple Choice)
5.0/5
(30)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.8/5
(32)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)