Exam 10: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.

(Multiple Choice)
4.8/5
(35)

Controls that are used to assess whether anything went wrong,such as unauthorized access attempts,are called ________ controls.

(Multiple Choice)
4.7/5
(33)

Information dissemination refers to the use of Web sites to provide information for recruiting new members as well as utilizing more interactive Internet technologies.

(True/False)
4.8/5
(35)

WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,are called ________.

(Multiple Choice)
4.7/5
(35)

________ are false messages circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.

(Multiple Choice)
4.8/5
(33)

A hot backup site is an empty warehouse with all necessary connections for power and communication.

(True/False)
4.8/5
(31)

The ________ is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and to establish appropriate controls.

(Multiple Choice)
4.8/5
(44)

List the commonly used methods in which technology is employed to safeguard information systems.

(Essay)
4.8/5
(38)

Patents generally refer to creations of the mind such as music,literature,or software.

(True/False)
4.9/5
(41)

Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?

(Multiple Choice)
4.9/5
(43)

________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.

(Multiple Choice)
4.9/5
(42)

Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.

(True/False)
4.9/5
(37)

Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls.This process is called ________.

(Multiple Choice)
4.9/5
(34)

People who break into computer systems with the intention of doing damage or committing a crime are called ________.

(Multiple Choice)
4.8/5
(38)

Information systems ________ is done to obtain an understanding of the threats to the confidentiality,integrity,and availability of data and systems.

(Multiple Choice)
4.9/5
(39)

Glassico Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a countermeasure,the company installs strong firewalls and protective software.These steps are a part of ________.

(Multiple Choice)
4.9/5
(37)

________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.

(Multiple Choice)
4.9/5
(37)

________ is the use of formal investigative techniques to evaluate digital information for judicial review.

(Multiple Choice)
4.9/5
(39)

A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.

(Multiple Choice)
4.8/5
(45)

A honeypot is a computer,data,or network site that is used to penetrate other networks and computer systems to snoop or to cause damage.

(True/False)
4.9/5
(33)
Showing 61 - 80 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)