Exam 5: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In most cases,companies can screen vendor,partner personnel and public users.

(True/False)
4.8/5
(32)

Which of the following is a valid difference between a password and user name?

(Multiple Choice)
4.8/5
(29)

The ___________ should also gather and preserve evidence for legal action.

(Multiple Choice)
4.8/5
(35)

Many organizations create honey-pots,which are false targets for hackers to attack.

(True/False)
4.9/5
(36)

A __________ is a systematic evaluation of security by assessing how well the security safeguards conform to established criteria.

(Multiple Choice)
4.8/5
(35)

Standard human resource policies should ensure that system administrators receive notification in advance of the employee's last day so they can remove accounts and passwords.

(True/False)
4.9/5
(33)

A vulnerability is some measure that individuals or organizations take to block the threat from obtaining the asset.

(True/False)
4.8/5
(38)

Companies often allow employees to use their own personal mobile device to conduct company activities,a policy called Bring Your Own Device (BYOD).

(True/False)
4.8/5
(35)

A company-wide security policy should include how employees and others can request changes to inaccurate data.

(True/False)
4.9/5
(43)

In a typical _________ attack,the criminal posts a reply to a discussion board but along with The plaintext reply adds malicious code invisible to the discussion board.

(Multiple Choice)
4.8/5
(36)

Provide a brief explanation for each of the three categories of security losses:

(Essay)
4.9/5
(42)

Malware definitions-patterns that exist in malware code-should be downloaded frequently.

(True/False)
4.8/5
(34)

Why should every company have a security incident response plan? What steps are involved?

(Essay)
4.7/5
(45)

______________ concerns the creation of new user accounts,the modification of existing account permissions,and the removal of unneeded accounts.

(Multiple Choice)
4.8/5
(30)

Removing and disabling cookies improves security,but your computer will be more difficult to use.

(True/False)
4.8/5
(45)

Few individuals take security as seriously as they should,and most fail to implement even low-cost safeguards.

(True/False)
4.8/5
(36)

Malware protection is an example of a data safeguard.

(True/False)
4.8/5
(31)

Firewalls are an example of what type of safeguard?

(Multiple Choice)
4.8/5
(40)

The preventative measures used by organizations to reduce IS security are called:

(Multiple Choice)
4.8/5
(41)

A number used to encrypt data is called a(n)________.

(Multiple Choice)
4.9/5
(34)
Showing 81 - 100 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)