Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Adware and spyware are similar to each other in that they both ________.

(Multiple Choice)
4.8/5
(37)

A(n)________ examines the source address,destination address,and other data of a message and determines whether to let that message pass.

(Multiple Choice)
4.9/5
(40)

A criticism of biometric authentication is that it provides weak authentication.

(True/False)
4.8/5
(32)

________ occurs when a threat obtains data that is supposed to be protected.

(Multiple Choice)
4.8/5
(42)

Which of the following statements is true of symmetric encryption?

(Multiple Choice)
4.8/5
(39)

IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.

(True/False)
4.8/5
(32)

In a brute force attack,a password cracker tries every possible combination of characters.

(True/False)
4.9/5
(37)

Packet-filtering firewalls are the most sophisticated type of firewall.

(True/False)
4.9/5
(36)

What are the two critical security functions that an organization's senior management needs to address?

(Essay)
4.8/5
(29)

Malware protection is an example of a technical safeguard.

(True/False)
5.0/5
(33)

Incorrectly increasing a customer's discount is an example of incorrect data modification.

(True/False)
4.8/5
(25)

Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

(Multiple Choice)
4.8/5
(38)

In an organization,security sensitivity for each position should be documented.

(True/False)
4.9/5
(35)
Showing 81 - 93 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)