Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)________ is a sophisticated,possibly long-running computer hack that is perpetrated by large,well-funded organizations like governments.

(Multiple Choice)
5.0/5
(40)

Which of the following statements is true of the financial losses due to computer crimes?

(Multiple Choice)
4.8/5
(33)

Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.

(True/False)
4.9/5
(43)

What are some of the recommended personal security safeguards against security threats?

(Essay)
4.8/5
(39)

The loss of encryption keys by employees is referred to as key escrow.

(True/False)
4.7/5
(46)

Davian,a professional hacker,tries every possible combination of characters to crack his victim's email password.Using this technique,he can crack a six-character password of either upper- or lowercase letters in about five minutes.Which of the following techniques is used by Davian to obtain access to his victim's email?

(Multiple Choice)
4.9/5
(39)

________ is a broad category of software that includes viruses,worms,Trojan horses,spyware,and adware.

(Multiple Choice)
4.8/5
(36)

A ________ is a plastic card that has a microchip loaded with identifying data.

(Multiple Choice)
4.9/5
(48)

To safeguard data against security threats,every information system today requires a user name and a password.In this case,which of the following functions is performed by the user name?

(Multiple Choice)
4.9/5
(25)

Which of the following is a human safeguard against security threats?

(Multiple Choice)
5.0/5
(29)

Explain how secure sockets layer works when a user communicates securely with a Web site.

(Essay)
4.8/5
(35)

A threat is a person or an organization that seeks to obtain or alter data illegally,without the owner's permission or knowledge.

(True/False)
4.9/5
(32)

Malware definitions are patterns that exist in malware code.

(True/False)
4.9/5
(38)

Spoofing is a technique for intercepting computer communications.

(True/False)
4.9/5
(32)

Wardrivers are those who engage in phishing to obtain unauthorized access to data.

(True/False)
4.8/5
(35)

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

(Multiple Choice)
4.8/5
(35)

Technical safeguards include encryption and usage of passwords.

(True/False)
4.9/5
(45)

Technical safeguards involve both software and hardware components of an information system.

(True/False)
4.8/5
(45)

In the case of public key encryption,each site has a private key to encode a message and a public key to decode it.

(True/False)
4.8/5
(41)

A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)