Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

PKI is the use of public key cryptography working with a(n)________.

(Short Answer)
4.8/5
(39)

________ refers to the ability to know that a person is who he or she claims to be.

(Short Answer)
4.8/5
(27)

Which of the following is not a trait used for identification in biometric systems?

(Multiple Choice)
4.9/5
(32)

In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.8/5
(36)

____________________ govern the design,security,and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.

(Short Answer)
4.7/5
(36)

Which of the following is the greatest threat that employees pose to an organization's information systems?

(Multiple Choice)
4.9/5
(41)

Viruses can be spread through e-mail.

(True/False)
4.8/5
(35)

In 2004,ICQ users were enticed by a sales message from a supposed anti-virus vendor.On the vendor's site,a small program called Mitglieder was downloaded to the user's machine.The program enabled outsiders to infiltrate the user's machine.What type of malware is this an example of?

(Multiple Choice)
4.9/5
(34)

___________________________ oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

(Multiple Choice)
4.7/5
(36)

How is the security of a firm's information system and data affected by its people,organization,and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.8/5
(42)

___________________________ ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.

(Multiple Choice)
4.8/5
(30)

When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called ________.

(Short Answer)
4.9/5
(26)

What is a digital certificate? How does it work?

(Essay)
4.8/5
(38)

An ___________________________ examines the firm's overall security environment as well as controls governing individual information systems.

(Multiple Choice)
4.8/5
(42)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.9/5
(47)

Electronic data are more susceptible to destruction,fraud,error,and misuse because information systems concentrate data in computer files that

(Multiple Choice)
4.8/5
(27)

A Trojan horse is a software program that appears to be benign but then does something other than expected.

(True/False)
4.8/5
(39)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.9/5
(36)

________ is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

(Short Answer)
4.9/5
(44)

The most common type of electronic evidence is

(Multiple Choice)
4.9/5
(39)
Showing 61 - 80 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)