Exam 5: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is an example of inadvertent human error:

(Multiple Choice)
4.9/5
(33)

A __________ is a systematic evaluation of security by assessing how well the security safeguards conform to established criteria.

(Multiple Choice)
4.9/5
(35)

Management needs to cultivate a culture of compliance.

(True/False)
4.9/5
(40)

Your browser automatically stores a history of your browsing activities and temporary files that contain sensitive data about where you've visited,what you've purchased,and what your account names and passwords are.

(True/False)
4.8/5
(41)

What is two-factor authentication?

(Essay)
4.8/5
(35)

An organization should store all back-up database copies of premises for easier access.

(True/False)
4.8/5
(39)

When criminals replace a legitimate user or software program with their own access or illegitimate software program to give the attacker unauthorized control of some part of the IS,it is known as:

(Multiple Choice)
4.7/5
(37)

A firewall can be a special use computer,or it can be an app on a general-purpose computer or router.

(True/False)
4.8/5
(31)

Security is a trade-off with_________.

(Multiple Choice)
4.9/5
(32)

A user logs onto a banking website with their user id: email address and password: qwerty.This password is very common,so the user is prompted to provide extra information,such as a simple challenge-response exercise,this is an example of:

(Multiple Choice)
4.8/5
(36)

After the initial response to the disaster or incident,computer forensics can help determine the cause of the event.

(True/False)
4.8/5
(41)

What are the minimum requirements for a company wide security policy include?

(Essay)
4.9/5
(26)

Every organization should have an incident response plan as part of the security program.

(True/False)
4.8/5
(45)

What are some safeguards that can be taken by people/organizations to safeguard against threats and vulnerabilities?

(Essay)
4.9/5
(42)

__________ is a technique for intercepting computer communications.

(Multiple Choice)
4.9/5
(37)

What are the recommended personal security safeguards:

(Essay)
4.7/5
(37)

Describe how SSL/TLS works when a system communicates securely with a Web site.

(Essay)
4.8/5
(38)

Describe the three types of impersonation that can lead to data loss and provide an example for each:

(Essay)
4.8/5
(33)

_________is simply the chance of loss.

(Multiple Choice)
4.9/5
(37)

Which of the following is a difference between a public key and a private key?

(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)