Exam 7: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.

(Multiple Choice)
4.9/5
(25)

You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.

(Essay)
4.8/5
(41)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
4.8/5
(38)

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:

(Multiple Choice)
4.9/5
(27)

Pharming involves:

(Multiple Choice)
5.0/5
(32)

The Gramm-Leach-Bliley Act:

(Multiple Choice)
4.7/5
(46)

Rigorous password systems:

(Multiple Choice)
4.8/5
(45)

Public key encryption uses two keys.

(True/False)
4.7/5
(34)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.8/5
(30)

Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.

(True/False)
5.0/5
(35)

How do software vendors correct flaws in their software after it has been distributed?

(Multiple Choice)
4.9/5
(34)

An independent computer program that copies itself from one computer to another over a network is called a:

(Multiple Choice)
4.8/5
(37)

Define a fault-tolerant computer system and a high-availability computer system.How do they differ? When would each be used?

(Essay)
4.9/5
(45)

Downtime refers to periods of time in which a:

(Multiple Choice)
4.8/5
(33)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.7/5
(33)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:

(Multiple Choice)
4.9/5
(38)

A keylogger is a type of:

(Multiple Choice)
4.7/5
(38)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.8/5
(38)

In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.8/5
(23)

Hackers and their companion viruses are an increasing problem,especially on the Internet.What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.8/5
(43)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)