Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Your company's headquarters was just hit head-on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

D

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

B

Authentication and authorization are synonyms.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

Identify and discuss the factors that are contributing to the increasing vulnerability of organizational information assets.

(Not Answered)
This question doesn't have any answer yet
Ask our community

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.

(Multiple Choice)
4.7/5
(40)

Organizations utilize layers of controls because they face so many diverse threats to information security.

(True/False)
4.7/5
(35)

Biometrics are an example of:

(Multiple Choice)
4.7/5
(35)

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

(Multiple Choice)
4.8/5
(35)

Contrast the four types of authentication.

(Not Answered)
This question doesn't have any answer yet
Ask our community

____________ is an intellectual work, such as a business plan, that is a company secret and is not based on public information.

(Multiple Choice)
4.9/5
(27)

Employees in which functional areas of the organization pose particularly grave threats to information security?

(Multiple Choice)
4.8/5
(39)

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.

(Multiple Choice)
4.7/5
(41)

Which of the following is a characteristic of backups?

(Multiple Choice)
4.8/5
(29)

Define the principle of least privilege, and consider how an organization's senior executives might view the application of this principle.

(Not Answered)
This question doesn't have any answer yet
Ask our community

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

(Multiple Choice)
4.9/5
(34)

Dumpster diving is always illegal because it involves trespassing on private property.

(True/False)
4.9/5
(42)

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

(Multiple Choice)
4.8/5
(38)

In the "Catching a Hacker" case study. The purpose of SpyEye is to _____________.

(Multiple Choice)
5.0/5
(36)

Not logging off the company network when gone from the office for any extended period of time is an example of which type of human mistake?

(Multiple Choice)
4.8/5
(29)

According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.

(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)