Exam 13: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the first step in risk management?

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

D

Which of the following observations concerning Secure Socket Layer (SSL)is true?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

An example of a system-specific security policy would be ________.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

Wireless networks are more secure than wired networks.

(True/False)
4.8/5
(37)

When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial-of-service attack.

(True/False)
4.9/5
(39)

Users should scan their computers with anti-malware programs at least ________.

(Multiple Choice)
4.7/5
(38)

________ occurs when a person gains unauthorized access to a computer system.

(Multiple Choice)
4.8/5
(35)

When an employee notices a virus on his or her machine,the ________ plan should specify what to do.

(Multiple Choice)
4.8/5
(36)

________ is when someone deceives by pretending to be someone else.

(Multiple Choice)
4.9/5
(32)

Which of the following usually happens in a malicious denial-of-service attack?

(Multiple Choice)
4.8/5
(34)

Which of the following observations is true of a cold site?

(Multiple Choice)
4.7/5
(33)

Because encryption slows processing,most messages are sent over the Internet as ________.

(Multiple Choice)
4.8/5
(34)

What are the key elements of a security policy?

(Essay)
4.8/5
(37)

Uncertainty is the likelihood of an adverse occurrence.

(True/False)
4.7/5
(30)

Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.

(True/False)
4.9/5
(36)

Which of the following is an example of a technical safeguard?

(Multiple Choice)
4.8/5
(35)

________ is the term used to denote viruses,worms,Trojan horses,spyware,and adware.

(Multiple Choice)
5.0/5
(30)

What is a security threat? What are the three general sources of security threats?

(Essay)
4.9/5
(30)

________ a site means to take extraordinary measures to reduce a system's vulnerability.

(Multiple Choice)
4.8/5
(35)

When an account is created,the new user should continue to use the safe password provided to him.

(True/False)
4.8/5
(24)
Showing 1 - 20 of 137
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)