Exam 5: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most secure communication over the Internet uses a protocol called HTTP.

(True/False)
4.9/5
(38)

Poorly written application programs and procedures are sources of security threats.

(True/False)
4.8/5
(34)

A key is a physical device that is used to lock and unlock a message.

(True/False)
4.9/5
(42)

When a security incident does occur,it's important to slowly and carefully respond.

(True/False)
4.7/5
(37)

__________is a sophisticated,possibly long-running computer hack that is perpetrated by large,well-funded organizations such as governments.

(Multiple Choice)
4.8/5
(40)

Most email and messaging are protected by encryption,and you should assume that anything you write in email or messaging is safe.

(True/False)
4.9/5
(34)

What are five human safeguards that can protect against security threats? Prove a brief description for each.

(Essay)
4.8/5
(39)

Responsibility and accountability are important factors in enforcing security policies.

(True/False)
4.8/5
(40)

The first safeguard against security threats is:

(Multiple Choice)
4.8/5
(37)

No safeguard by itself is completely effective; there is no silver bullet,no simple solution.

(True/False)
4.8/5
(40)

Employee compliance is greater when:

(Multiple Choice)
4.9/5
(30)

Safeguards are cost prohibitive and increase work efficiency.

(True/False)
4.8/5
(45)

One type of attack on common passwords is brute force attack.

(True/False)
4.8/5
(41)

Employee compliance is typically greatest when:

(Multiple Choice)
4.7/5
(44)

In the case of ________,the same key is used to encode and to decode a message.

(Multiple Choice)
4.9/5
(44)

A ______ is a person or organization that seeks to obtain or alter data or other assets illegally,without the owner's permission and often without the owner's knowledge.

(Multiple Choice)
4.8/5
(30)

__________is the process of reducing the vulnerabilities of a computer by restricting the functions and actions it is willing to perform.

(Multiple Choice)
4.9/5
(32)

Which of these following is a true statement about using the cloud?

(Multiple Choice)
4.8/5
(27)

Human safeguards result when authorized users follow appropriate procedures for system use and recovery.

(True/False)
4.7/5
(27)

Safeguards restrict freedoms by limiting what employees can do.

(True/False)
4.9/5
(36)
Showing 41 - 60 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)