Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Risk management is a critical security function addressed by an organization's senior management.

(True/False)
4.8/5
(36)

What are the precautions to be taken when opening email attachments to avoid malwares?

(Essay)
4.9/5
(42)

Incident-response plans should provide centralized reporting of all security incidents.

(True/False)
4.8/5
(32)

________ are viruses that masquerade as useful programs like a computer game,an MP3 file,or some other useful innocuous program.

(Multiple Choice)
4.9/5
(39)

A(n)________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.

(Multiple Choice)
4.8/5
(38)

A user name authenticates a user,and a password identifies that user.

(True/False)
4.8/5
(34)

A(n)________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

(Multiple Choice)
4.9/5
(34)

Viruses,worms,and Trojan horses are types of firewalls.

(True/False)
4.7/5
(34)

A(n)________ includes how employees should react to security problems,whom they should contact,the reports they should make,and steps they can take to reduce further loss.

(Multiple Choice)
4.9/5
(42)

Which of the following is a data safeguard against security threats?

(Multiple Choice)
4.9/5
(34)

________ a site means to take extraordinary measures to reduce a system's vulnerability.

(Multiple Choice)
4.8/5
(36)

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

(Multiple Choice)
4.8/5
(39)

Backup and recovery against computer security threats are ________.

(Multiple Choice)
4.7/5
(42)

Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.

(True/False)
4.9/5
(34)

Financial institutions must invest heavily in security safeguards because they are obvious targets for theft.

(True/False)
4.8/5
(36)

The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.

(Multiple Choice)
4.8/5
(40)

________ are small files that browsers store on users' computers when they visit Web sites.

(Multiple Choice)
4.9/5
(37)

Explain the types of events that result in faulty service,a type of security loss.

(Essay)
4.8/5
(47)

Explain how defining positions in an organization can safeguard against security threats.

(Essay)
4.9/5
(29)

Thomas is responsible for creating backup copies of information in a system.He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist.Thomas is involved in establishing ________.

(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)