Exam 10: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

C

The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.

Free
(True/False)
4.9/5
(42)
Correct Answer:
Verified

False

________ refers to offering stolen proprietary software for free over the Internet.

Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
Verified

B

Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers,and its databases contain valuable information about the customers.The loss of customer information that is used to decide services would be extremely harmful to the organization.Which of the following strategies adopted by Ciscon is an example of risk transference?

(Multiple Choice)
4.8/5
(33)

________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.

(Multiple Choice)
4.9/5
(32)

List the policies and procedures that guide users' decisions and establish responsibilities within an organization.

(Essay)
4.9/5
(32)

Recovery point objectives of a recovery plan specify ________.

(Multiple Choice)
4.8/5
(29)

A ________ is a small text file passed to a Web browser on a user's computer by a Web server.

(Multiple Choice)
4.7/5
(37)

Ransomware is a type of adware.

(True/False)
4.8/5
(35)

Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.

(True/False)
4.8/5
(31)

________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.

(Multiple Choice)
4.7/5
(26)

An account management policy explains technical controls on all organizational computer systems,such as access limitations,audit-control software,firewalls,and so on.

(True/False)
4.8/5
(37)

A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.

(Multiple Choice)
4.9/5
(30)

Compare and contrast computer viruses and a Trojan horse.

(Essay)
4.7/5
(44)

A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.

(True/False)
4.8/5
(34)

Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?

(Multiple Choice)
4.8/5
(31)

Control objectives for information and related technology (COBIT)is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and establish appropriate controls.

(True/False)
5.0/5
(33)

Which of the following is one of the main federal laws against computer crimes in the United States?

(Multiple Choice)
4.8/5
(39)

Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.

(Multiple Choice)
4.9/5
(34)

Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.

(True/False)
4.9/5
(33)
Showing 1 - 20 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)