Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

(Multiple Choice)
4.8/5
(40)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.8/5
(44)

Rigorous password systems

(Multiple Choice)
4.8/5
(49)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.9/5
(45)

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

(True/False)
4.9/5
(32)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of

(Multiple Choice)
4.8/5
(40)

As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.

(True/False)
4.9/5
(46)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.8/5
(45)

Application controls

(Multiple Choice)
4.9/5
(41)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.9/5
(42)

The most common type of electronic evidence is

(Multiple Choice)
4.8/5
(32)

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

(Multiple Choice)
4.8/5
(34)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

(Multiple Choice)
4.8/5
(32)

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

(True/False)
4.9/5
(43)

Biometric authentication

(Multiple Choice)
4.8/5
(31)

A digital certificate system

(Multiple Choice)
4.9/5
(34)

In 2013, Panda Security reported approximately 30 million new kinds of malware strains.

(True/False)
4.7/5
(41)

The Internet poses specific security problems because

(Multiple Choice)
4.9/5
(41)

A firewall allows the organization to

(Multiple Choice)
4.8/5
(41)

Social networking sites have become a new conduit for malware because

(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)