Exam 5: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Given appropriate job descriptions,user accounts should be defined to give users the most possible privilege needed to perform their jobs.

(True/False)
4.8/5
(31)

Companies that invest in _________ have been shown to reduce the frequency and severity of their security losses.

(Multiple Choice)
4.7/5
(38)

What are the challenges of information systems security?

(Essay)
4.8/5
(41)

______________ result/s when authorized users follow appropriate procedures for system use and recovery.

(Multiple Choice)
4.7/5
(36)

A/n ________ is a computing device that prevents unauthorized network access.

(Multiple Choice)
4.8/5
(34)

If the vendor does not use https,it is still safe to use that online vendor.

(True/False)
4.8/5
(40)

Which of these following is a true statement about safeguards:

(Multiple Choice)
4.9/5
(37)

List seven ways safeguards to avoid most malware:

(Essay)
4.8/5
(28)

What are the two main sources of security threats? Provide examples for each one.

(Essay)
4.7/5
(27)

Security is rarely breached,and the frequency of security breaches will slow down in the future.

(True/False)
4.9/5
(36)

Why are safeguards costly and sometimes restrictive?

(Essay)
4.9/5
(40)

The process ____________of verifies the credentials of the individual seeking access to a computer resource.

(Multiple Choice)
4.9/5
(41)

Human errors and mistakes include accidental or unintended problems caused by both employees and nonemployees.

(True/False)
4.8/5
(37)

Departmental personnel should develop procedures for system recovery.

(True/False)
4.8/5
(32)

What is a firewall and how do they work? What are two types of firewalls?

(Essay)
4.9/5
(37)

__________is the process of reducing the vulnerabilities of a computer by restricting the functions and actions it is willing to perform.

(Multiple Choice)
4.9/5
(40)

When hiring for high-sensitivity positions,extensive interviews,references,and background investigations are appropriate.

(True/False)
5.0/5
(37)

Technical safeguards block threats from obtaining an asset by using the hardware and software components of an information system.

(True/False)
4.8/5
(31)

An organization should store some back-up database copies off premises,possibly in a remote location.

(True/False)
4.8/5
(44)

_________blocks access to a computer until the victim pays money to the attacker.

(Multiple Choice)
4.8/5
(46)
Showing 61 - 80 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)