Exam 7: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

SSL is a protocol used to establish a secure connection between two computers.

Free
(True/False)
4.8/5
(39)
Correct Answer:
Verified

True

You have been hired as a security consultant for a law firm.Which of the following constitutes the greatest source of security threats to the firm?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

Evil twins are:

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

D

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.9/5
(41)

High-availability computing is also referred to as fault tolerance.

(True/False)
4.8/5
(36)

Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.

(Multiple Choice)
4.9/5
(30)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.

(Multiple Choice)
4.8/5
(40)

When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called debugging.

(True/False)
4.8/5
(35)

The Sarbanes-Oxley Act:

(Multiple Choice)
5.0/5
(40)

Viruses can be spread through e-mail.

(True/False)
4.9/5
(39)

Biometric authentication:

(Multiple Choice)
4.8/5
(32)

Which of the following statements about the Internet security is not true?

(Multiple Choice)
4.9/5
(33)

A(n)________ audit examines the firm's overall security environment as well as the controls governing individual information systems.

(Multiple Choice)
4.9/5
(35)

Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?

(Essay)
4.9/5
(35)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

(True/False)
4.8/5
(37)

The HIPAA Act of 1996:

(Multiple Choice)
4.7/5
(28)

An example of phishing is:

(Multiple Choice)
4.8/5
(40)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.7/5
(41)

Electronic evidence on computer storage media that is not visible to the average user is called ________ data.

(Multiple Choice)
4.9/5
(36)

Malicious software programs referred to as spyware include a variety of threats such as computer viruses,worms,and Trojan horses.

(True/False)
4.9/5
(32)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)