Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a strategy for mitigating the risk of threats against information?

(Multiple Choice)
4.9/5
(28)

Walls, doors, and fences are examples of __________ controls.

(Multiple Choice)
4.7/5
(29)

Which of the following is/are designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

(Multiple Choice)
4.7/5
(39)

Being careless with your computing devices is ______________.

(Multiple Choice)
4.8/5
(36)

Social engineering is typically _____________ human error on the part of an employee, but it is _____________ on the part of the attacker.

(Multiple Choice)
4.8/5
(36)

Describe how a digital certificate works.

(Not Answered)
This question doesn't have any answer yet
Ask our community

In _____, the organization purchases insurance as a means to compensate for any loss.

(Multiple Choice)
4.9/5
(33)

Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Biometrics is something the user _______.

(Multiple Choice)
4.9/5
(33)

Dumpster diving is:

(Multiple Choice)
4.7/5
(41)

Shodan is used for _________.

(Multiple Choice)
4.7/5
(50)

Software can be copyrighted.

(True/False)
4.9/5
(34)

Which of the following is not a characteristic of strong passwords?

(Multiple Choice)
4.9/5
(46)

Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim's information security strategy.

(Not Answered)
This question doesn't have any answer yet
Ask our community

A password refers to "something the user is."

(True/False)
4.7/5
(35)

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

(Multiple Choice)
4.8/5
(36)

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA)systems to cause widespread physical damage.

(True/False)
4.8/5
(41)

Which of the following statements concerning the difficulties in protecting information resources is not correct?

(Multiple Choice)
4.8/5
(37)

A ___________ site does not include the actual applications the company runs.

(Multiple Choice)
4.8/5
(40)

Describe public key encryption.

(Not Answered)
This question doesn't have any answer yet
Ask our community
Showing 61 - 80 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)