Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following factors is not increasing the threats to information security?

(Multiple Choice)
4.8/5
(44)

The cost of a stolen laptop includes all of the following except:

(Multiple Choice)
4.8/5
(33)

A VPN is a network within the organization.

(True/False)
4.9/5
(36)

Auditing _____________ the computer means inputs, outputs, and processing are checked.

(Multiple Choice)
4.9/5
(43)

A _____ is intellectual work that is known only to a company and is not based on public information.

(Multiple Choice)
4.9/5
(45)

Risk is the ___________ that a threat will impact information resources.

(Short Answer)
4.7/5
(36)

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

(Multiple Choice)
4.9/5
(40)

Unintentional threats to information systems include all of the following except:

(Multiple Choice)
4.8/5
(39)

Which of the following is not an example of a weak password?

(Multiple Choice)
4.8/5
(20)

Which of the following is not a reason it is difficult to protect information resources?

(Multiple Choice)
4.9/5
(37)

Cybercriminals can obtain the information they need in order to assume another person's identity by:

(Multiple Choice)
4.8/5
(39)

Which of the following is not a way you can protect yourself online?

(Multiple Choice)
4.7/5
(36)

The employees who pose the biggest risk to information security work in _____________.

(Multiple Choice)
4.8/5
(38)

In _____, the organization takes concrete actions against risks.

(Multiple Choice)
4.9/5
(26)

In most cases, cookies track your path through websites and are therefore invasions of your privacy.

(True/False)
4.8/5
(41)

The security of each computer on the Internet is independent of the security of all other computers on the Internet.

(True/False)
4.7/5
(28)

The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer.

(Multiple Choice)
5.0/5
(52)

_____ are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.

(Multiple Choice)
5.0/5
(44)

Which of the following statements concerning firewalls is not true?

(Multiple Choice)
4.8/5
(41)

Risk is the ___________ that a threat will impact information resources.

(Short Answer)
4.8/5
(31)
Showing 101 - 120 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)