Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Trojan horses are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.

(True/False)
4.9/5
(44)

A(n)______________ is any danger to which a system may be exposed.

(Multiple Choice)
4.9/5
(38)

______________ is a private network that uses a public network to connect users securely to the organization's internal systems.

(Multiple Choice)
4.9/5
(38)

Risk _________ involves minimizing the impact of a threat.

(Multiple Choice)
4.9/5
(38)

An information system's _______ is the possibility that the system will be harmed by a threat.

(Multiple Choice)
4.8/5
(37)

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

(Multiple Choice)
4.8/5
(39)

______________ is a process in which a company allows all software to run unless it is on the list.

(Multiple Choice)
4.8/5
(29)

Passwords and passphrases are examples of:

(Multiple Choice)
4.8/5
(35)

Organizations use authentication to establish privileges to systems operations.

(True/False)
4.9/5
(30)

Contrast risk acceptance, risk limitation, and risk transference.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Cookies in your web browser are not tracked by businesses.

(True/False)
4.9/5
(40)

Rank the following in terms of dollar value of the crime, from highest to lowest.

(Multiple Choice)
4.9/5
(35)

You start a new job, and Human Resources gives you a 10-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?

(Multiple Choice)
4.8/5
(37)

The Internet is a(n)___________ network.

(Multiple Choice)
4.9/5
(42)

The most overlooked people in information security are:

(Multiple Choice)
4.9/5
(33)

Shodan's primary purpose is ___________.

(Multiple Choice)
4.9/5
(38)

A DMZ is located ______________.

(Multiple Choice)
4.9/5
(36)

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.

(Multiple Choice)
4.9/5
(36)

Which of the following is not a factor increasing the vulnerability of information resources?

(Multiple Choice)
4.9/5
(40)

Access controls involve _______ before _______.

(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)