Exam 10: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following U.S.laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?

(Multiple Choice)
4.8/5
(32)

Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization.

(Multiple Choice)
4.9/5
(34)

The science of encryption is called ________.

(Multiple Choice)
4.8/5
(34)

________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning,recruitment,and numerous other endeavors.

(Multiple Choice)
4.9/5
(37)

Which of the following can be referred for a patent?

(Multiple Choice)
4.7/5
(32)

What are cookies? Do they pose a threat to users?

(Essay)
4.9/5
(44)

Which of the following is the most accurate definition of a computer crime?

(Multiple Choice)
4.8/5
(33)

Briefly explain cyberstalking and cybersquatting.

(Essay)
4.9/5
(33)

________ contains spyware that collects information about a person's Web surfing behavior in order to customize Web site banner advertisements.

(Multiple Choice)
4.8/5
(51)

________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.

(Multiple Choice)
4.9/5
(36)

Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.

(Multiple Choice)
4.8/5
(32)

Insuring all the systems and information processing tasks is an essential part of risk acceptance strategy.

(True/False)
4.8/5
(33)

A virtual private network is also called a secure tunnel.

(True/False)
4.8/5
(31)

Fyroff consultants,a leading software consulting firm in the United States,decides to launch an Enterprise Resource Planning (ERP)solution.The company chooses the brand name FyroffEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that a small unknown firm is already registered under the same domain name.The small firm is now attempting to sell the domain name to Fyroff.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?

(Multiple Choice)
4.9/5
(37)

Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?

(Multiple Choice)
4.7/5
(32)

Computers that are located in homes,schools,and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.

(Multiple Choice)
4.8/5
(34)

The term social engineering refers to misrepresenting oneself to trick others into revealing information.

(True/False)
5.0/5
(33)

Spam filters are used to reduce the amount of spam processed by central e-mail servers.

(True/False)
4.9/5
(30)

The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information.

(True/False)
4.9/5
(42)

Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power,backups,connectivity,and security.Such data centers are called ________.

(Multiple Choice)
4.7/5
(37)
Showing 41 - 60 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)