Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.8/5
(42)

Digital Warfare is a state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks for the purposes of causing damage and disruption

(True/False)
4.8/5
(31)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

(Multiple Choice)
4.9/5
(39)

In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?

(Multiple Choice)
4.8/5
(38)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.8/5
(40)

Smaller firms may outsource some or many security functions to

(Multiple Choice)
4.7/5
(25)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up.This is an example of

(Multiple Choice)
4.8/5
(35)

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called

(Multiple Choice)
4.7/5
(36)

Pharming redirects users to a bogus Web page,even when the individual types the correct Web page address into his or her browser.

(True/False)
4.9/5
(31)

___________________________ devises plans for the restoration of computing and communications services after they have been disrupted

(Multiple Choice)
4.8/5
(46)

____________________ ensure that computer hardware is physically secure and check for equipment malfunction.

(Short Answer)
4.9/5
(27)

Which of the following is not one of the challenges in securing wireless networks?

(Multiple Choice)
4.8/5
(30)

High-availability computing is also referred to as fault tolerance.

(True/False)
4.9/5
(38)

Hackers create a botnet by

(Multiple Choice)
5.0/5
(41)

Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.

(Short Answer)
4.8/5
(37)

____________________ monitor the use of system software and prevent unauthorized access of software programs,system software,and computer programs.

(Short Answer)
4.7/5
(33)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

(Multiple Choice)
4.8/5
(37)

A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed,usually without user knowledge or permission.

(True/False)
5.0/5
(38)

Rigorous password systems

(Multiple Choice)
4.8/5
(43)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.

(Multiple Choice)
4.8/5
(40)
Showing 81 - 100 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)