Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_______________ assesses the value of each asset being protected, estimates the probability it might be compromised, and compares the probable costs of it being compromised with the cost of protecting it.

(Multiple Choice)
4.9/5
(31)

Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA)system.

(Not Answered)
This question doesn't have any answer yet
Ask our community

_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

(Multiple Choice)
4.8/5
(42)

Social engineers often impersonate legitimate employees.

(True/False)
4.8/5
(32)

______________ is when permission is issued to individuals and groups to do certain activities that can be performed by users of the system.

(Short Answer)
4.9/5
(37)

You start a dog-walking service, and you store your client's records on your smart phone. You don't need to worry about information security.

(True/False)
4.7/5
(36)

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

(Multiple Choice)
4.8/5
(37)

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?

(Multiple Choice)
4.9/5
(41)

Backup plans are not always necessary.

(True/False)
4.7/5
(36)

The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.

(True/False)
4.9/5
(39)

Explain why anti-malware software is classified as reactive.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Risk analysis involves determining whether security programs are working.

(True/False)
4.9/5
(39)

Zero-day attacks use deceptive e-mails to acquire sensitive personal information.

(True/False)
4.8/5
(42)

Voice and signature recognition are examples of:

(Multiple Choice)
4.7/5
(32)

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

(Multiple Choice)
4.9/5
(28)

A _____ is a document that grants the holder exclusive rights on an invention for 20 years.

(Multiple Choice)
4.9/5
(49)

The main purpose for the attack on Sony Pictures Entertainment on November 24, 2014, was to stop the release of the movie The Interview.

(True/False)
4.8/5
(47)

Social engineering is when the attacker uses _____________ to trick a legitimate employee into providing confidential company information such as passwords.

(Short Answer)
4.8/5
(30)

A copyright provides creators of intellectual property with ownership of the property for the life of the creator plus _________ years.

(Multiple Choice)
4.9/5
(34)

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.

(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)