Exam 7: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Authorization refers to the ability to know that a person is who he or she claims to be.

(True/False)
4.9/5
(41)

In 2004,ICQ users were enticed by a sales message from a supposed anti-virus vendor.On the vendor's site,a small program called Mitglieder was downloaded to the user's machine.The program enabled outsiders to infiltrate the user's machine.What type of malware is this an example of?

(Multiple Choice)
4.9/5
(41)

Packet filtering catches most types of network attacks.

(True/False)
4.9/5
(42)

A firewall allows the organization to:

(Multiple Choice)
4.8/5
(31)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.9/5
(47)

For 100% availability,online transaction processing requires:

(Multiple Choice)
4.9/5
(41)

Statements ranking information risks and identifying security goals are included in a(n):

(Multiple Choice)
4.8/5
(41)

A walkthrough is a type of software testing used before software is even written.

(True/False)
4.7/5
(31)

Specific security challenges that threaten corporate servers in a client/server environment include:

(Multiple Choice)
4.9/5
(37)

An authentication token is a(n):

(Multiple Choice)
4.9/5
(41)

Specific security challenges that threaten the communications lines in a client/server environment include:

(Multiple Choice)
4.8/5
(30)

A firewall identifies all of the following characteristics of incoming traffic,except:

(Multiple Choice)
4.8/5
(34)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.8/5
(39)

Hackers create a botnet by:

(Multiple Choice)
4.8/5
(46)

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

(True/False)
4.9/5
(40)

________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.

(Multiple Choice)
4.9/5
(37)

Smaller firms may outsource some or many security functions to:

(Multiple Choice)
4.9/5
(30)

Computer forensics tasks include all of the following except:

(Multiple Choice)
4.7/5
(38)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):

(Multiple Choice)
4.8/5
(44)

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

(True/False)
4.7/5
(41)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)