Exam 10: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain various types of information systems controls.

(Essay)
4.8/5
(37)

Robert receives an e-mail which says that he has won an online lottery worth $50 billion.Robert has his doubts as he does not remember buying a lottery ticket.He finds out that it is a spam e-mail intended to obtain his bank account details and credit card number.Which of the following is evident here?

(Multiple Choice)
4.9/5
(38)

Corrective controls are used to mitigate the impact of any problem after it has arisen,such as restoring compromised data.

(True/False)
4.7/5
(30)

Which of the following is the most accurate definition of a botnet?

(Multiple Choice)
4.8/5
(40)

With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.

(Multiple Choice)
4.9/5
(34)

What is unauthorized access? Provide a few examples for unauthorized access.

(Essay)
4.9/5
(30)

While adding information to the employee information database,Neil's computer crashed,and the entire database was erased.Which of the following types of viruses caused Neil's computer to crash?

(Multiple Choice)
4.8/5
(32)

________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.

(Multiple Choice)
4.8/5
(48)

Recovery point objectives are used to specify how current the backup data should be.

(True/False)
4.8/5
(41)

An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.

(Multiple Choice)
4.8/5
(29)

The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.

(Multiple Choice)
4.8/5
(31)

Briefly explain cyberwar and cyberterrorism.

(Essay)
4.9/5
(45)

Briefly explain the concept of computer crime.

(Essay)
4.7/5
(28)

Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.

(Multiple Choice)
4.8/5
(34)

The act of cybercriminals to gain information on a victim by monitoring online activities,accessing databases,and making false accusations are forms of ________.

(Multiple Choice)
4.8/5
(37)

When a company uses a fingerprint recognition system instead of access cards,it helps the company prevent unauthorized physical access.Which of the following technologies is used for authentication here?

(Multiple Choice)
4.9/5
(32)

An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.

(Multiple Choice)
4.8/5
(30)

________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments.

(Multiple Choice)
4.9/5
(35)

Which of the following is a valid observation about encryption?

(Multiple Choice)
4.8/5
(37)

Briefly describe the concept of virtual private networks.

(Essay)
4.9/5
(32)
Showing 81 - 100 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)