Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Pharming involves

(Multiple Choice)
5.0/5
(40)

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise.List at least five Internet security challenges.

(Essay)
4.8/5
(46)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.

(Multiple Choice)
4.9/5
(50)

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

(True/False)
4.8/5
(32)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.9/5
(34)

The Internet poses specific security problems because

(Multiple Choice)
5.0/5
(36)

What are the security challenges faced by wireless networks?

(Essay)
4.8/5
(43)

For 100% availability,online transaction processing requires

(Multiple Choice)
4.8/5
(38)

Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.

(True/False)
4.8/5
(42)

___________________________ focuses on how the company can restore business operations after a disaster strikes.

(Multiple Choice)
4.8/5
(31)

A ___________________________ is typically used to denote a hacker with criminal intent.

(Multiple Choice)
4.7/5
(44)

Most antivirus software is effective against

(Multiple Choice)
4.9/5
(30)

The intentional disruption of a Web site or information system is called ________.

(Short Answer)
4.9/5
(32)

Evil twins are

(Multiple Choice)
4.9/5
(40)

The Sarbanes-Oxley Act

(Multiple Choice)
4.8/5
(30)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.9/5
(42)

Which of the following statements about the Internet security is not true?

(Multiple Choice)
4.9/5
(28)

Which of the following is not one of the main firewall screening techniques?

(Multiple Choice)
4.8/5
(38)

Security are methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its records,and operational adherence to management standards.

(True/False)
4.8/5
(41)

Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.

(True/False)
4.7/5
(45)
Showing 41 - 60 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)