Exam 5: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A smart card uses personal physical characteristics such as fingerprints,facial features,and retinal scans to authenticate users.

(True/False)
4.7/5
(33)

Which of the following is a software threat?

(Multiple Choice)
4.9/5
(33)

________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

(Multiple Choice)
4.8/5
(34)

List and briefly explain the 6 human safeguards for employees that help block security threats.

(Essay)
4.8/5
(39)

The most challenging aspect of security is businesses do not thoroughly test the security of their new systems before they are employed.

(True/False)
4.7/5
(43)

A/An _______________attack in which a malicious hacker floods a Web server with millions of bogus service requests that so occupy the server that it cannot service legitimate requests.

(Multiple Choice)
4.8/5
(39)

Safeguards are a type of control; and like all controls,they limit behavior.

(True/False)
4.8/5
(38)

A __________ uses software or a dedicated computer to create a private network over the public Internet.

(Multiple Choice)
4.8/5
(37)

___________are small files that your browser stores on your computer when you visit Web sites.

(Multiple Choice)
4.8/5
(38)

With asymmetric encryption,________.

(Multiple Choice)
4.8/5
(38)

Information systems security is the process of preventing unauthorized access to an IS or modification of its data.

(True/False)
4.8/5
(37)

A public key is like the combination lock,and the private key is like the combination.

(True/False)
4.8/5
(42)

The single most important safeguard for computer security is to create and use strong passwords.

(True/False)
4.8/5
(43)

It is safe to share a password if you don't send it via email.

(True/False)
4.8/5
(39)

To be effective,information security must address unavoidable trade-offs.Describe two of these trade-offs.

(Essay)
4.8/5
(49)

The user name identifies the user and the password authenticates that user.

(True/False)
4.8/5
(48)

Reducing risk always costs,and the elimination of all risk would be exceptionally expensive if not impossible.

(True/False)
4.9/5
(36)
Showing 101 - 117 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)