Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Redirecting a Web link to a different address is a form of

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

A ____________________ is an individual who intends to gain unauthorized access to a computer system.

Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Verified

hacker

A hacker is an individual who intends to gain unauthorized access to a computer system.

Free
(True/False)
5.0/5
(41)
Correct Answer:
Verified

True

Cyber vandalism is the intentional disruption,defacement,or even destruction of a Web site or corporate information system.

(True/False)
4.8/5
(36)

A drive-by download is a technique used by hackers to enable accessing files on a wireless network.

(True/False)
4.9/5
(42)

Public key encryption uses two keys.

(True/False)
4.9/5
(29)

A(n)________ examines the firm's overall security environment as well as the controls governing individual information systems.

(Short Answer)
4.8/5
(40)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.8/5
(36)

An example of phishing is

(Multiple Choice)
4.7/5
(38)

In a _______________________________ attack hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network.

(Short Answer)
4.8/5
(30)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.7/5
(37)

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.

(Multiple Choice)
4.8/5
(45)

Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?

(Multiple Choice)
4.8/5
(39)

A digital certificate system

(Multiple Choice)
4.8/5
(42)

__________________________ refers to the policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems

(Short Answer)
4.8/5
(34)

Hackers and their companion viruses are an increasing problem,especially on the Internet.What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.9/5
(31)

Downtime refers to periods of time in which a

(Multiple Choice)
4.8/5
(39)

You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.

(Essay)
4.8/5
(38)

All of the following are methods of ensuring software quality except for

(Multiple Choice)
4.8/5
(43)

An authentication token is a(n)

(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)