Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a walkthrough,hackers are able to bypass security controls of a system with little opposition.

(True/False)
4.8/5
(29)

Currently,the protocols used for secure information transfer over the Internet are

(Multiple Choice)
4.8/5
(34)

You have been hired as a security consultant for a law firm.Which of the following constitutes the greatest source of security threats to the firm?

(Multiple Choice)
5.0/5
(39)

Application controls

(Multiple Choice)
4.9/5
(31)

Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?

(Essay)
5.0/5
(41)

A ___________________________ is typically used to denote a hacker with criminal intent.

(Multiple Choice)
4.9/5
(45)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.8/5
(31)

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

(True/False)
4.8/5
(41)

A(n)________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.

(Multiple Choice)
4.8/5
(33)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Short Answer)
4.7/5
(34)

Wireless networks in many locations do not have basic protections against war driving in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic.

(True/False)
4.8/5
(36)

Cyber vandalism occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.

(True/False)
4.8/5
(32)

___________________________ ensure that computer hardware is physically secure and check for equipment malfunction.

(Multiple Choice)
4.9/5
(37)

Controls refers to the policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems.

(True/False)
4.9/5
(38)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.8/5
(28)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.8/5
(46)

Malicious software programs referred to as ________ include a variety of threats such as computer viruses,worms,and Trojan horses.

(Short Answer)
4.8/5
(38)

Define a fault-tolerant computer system and a high-availability computer system.How do they differ? When would each be used?

(Essay)
4.8/5
(37)

________ refers to policies,procedures,and technical measures used to prevent unauthorized access,alternation,theft,or physical damage to information systems.

(Multiple Choice)
4.9/5
(38)

__________________________ are independent computer programs that copy themselves from one computer to other computers over a network.

(Short Answer)
4.9/5
(42)
Showing 21 - 40 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)