Exam 5: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Human errors are typically procedure problems: incorrect procedures or procedural mistakes.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

True

When you buy something online,you provide your credit card data; when that data is transmitted over the Internet,it is an example of:

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

B

When an unsuspecting user accesses a fake Wi-Fi access point,which has the same name as a legitimate Wi-Fi access point,this is an example of a/an:

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

D

IP spoofing occurs when an intruder uses another site's IP address to masquerade as the other site.

(True/False)
4.9/5
(39)

Security policies depend on whether the organization is governmental or nongovernmental.

(True/False)
4.9/5
(28)

Symmetric encryption is simpler and much faster than asymmetric encryption.

(True/False)
4.8/5
(31)

Users resist biometric identification because they feel it is invasive.

(True/False)
4.9/5
(34)

Which of these following is a true statement about using the cloud?

(Multiple Choice)
4.9/5
(40)

Input validation is an example of secure design.

(True/False)
4.8/5
(33)

___________are small files that your browser stores on your computer when you visit Web sites.

(Multiple Choice)
4.8/5
(35)

Explain why using the cloud can help with risk management?

(Essay)
4.8/5
(33)

What are five recommended smartphone security processes?

(Essay)
4.8/5
(28)

What is a firewall and how do they work? What are two types of firewalls?

(Essay)
4.7/5
(30)

The most important security safeguard for employees is:

(Multiple Choice)
4.9/5
(34)

With HTTPS,data are encrypted using a protocol called the _____________.

(Multiple Choice)
4.9/5
(36)

Sniffing is a term used to describe a variety of software that damages or disables computers.

(True/False)
4.8/5
(40)

Which of the following statements is true about biometric authentication?

(Multiple Choice)
5.0/5
(37)

Increasingly security experts view the cloud as the least secure option for transferring security risks.

(True/False)
4.8/5
(33)

_________is simply the chance of loss.

(Multiple Choice)
4.8/5
(31)

Which of the following is not an example of external threat that can affect software?

(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)