Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The creation of backup copies of database contents makes the data more vulnerable to security threats.

(True/False)
4.8/5
(40)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.8/5
(36)

Breaking into computers,servers,or networks to steal proprietary and confidential data is referred to as ________.

(Multiple Choice)
4.8/5
(50)

Which of the following information should be provided by users of smart cards for authentication?

(Multiple Choice)
4.7/5
(44)

Every information system today should require users to sign on with a user name and a password.In this case,which of the following functions is performed by the user's password?

(Multiple Choice)
4.8/5
(31)

Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.

(True/False)
4.8/5
(29)

A virus is a computer program that replicates itself.

(True/False)
4.8/5
(41)

In terms of password management,when an account is created,users should ________.

(Multiple Choice)
4.7/5
(45)

A(n)________ sits outside an organizational network and is the first device that Internet traffic encounters.

(Multiple Choice)
5.0/5
(34)

Explain the functions of the two organizational units responsible for data safeguarding.

(Essay)
4.9/5
(31)

Pretexting occurs when someone deceives by pretending to be someone else.

(True/False)
4.8/5
(37)

Which of the following statements is true of position sensitivity?

(Multiple Choice)
4.9/5
(40)

Which of the following types of encryption is used by the secure sockets layer protocol?

(Multiple Choice)
4.8/5
(41)

Existence of accounts that are no longer necessary does not pose a security threat.

(True/False)
4.9/5
(36)

A help-desk information system has answers to questions that only a true user of an account or system would know.

(True/False)
4.8/5
(33)

________ is a technique for intercepting computer communications.

(Multiple Choice)
4.8/5
(29)

There are no standards for tallying costs of computer crime.

(True/False)
4.8/5
(34)

________ take computers with wireless connections through an area and search for unprotected wireless networks.

(Multiple Choice)
4.9/5
(35)

Spyware programs are installed on a user's computer without the user's knowledge.

(True/False)
5.0/5
(30)

Which of the following is a synonym for phishing?

(Multiple Choice)
4.8/5
(26)
Showing 61 - 80 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)