Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Corruption of information can occur only while information is being stored.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

____________________are malware programs that hide their true nature,and reveal their designed behavior only when activated.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

D

Which of the following is the principle of management that develops,creates,and implements strategies for the accomplishment of objectives?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

D

What do audit logs that track user activity on an information system provide?

(Multiple Choice)
4.9/5
(32)

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance._________________________

(True/False)
4.7/5
(36)

A ____________________is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

(Multiple Choice)
4.9/5
(41)

List and explain the four principles of management under the contemporary or popular management theory.Briefly define each.

(Essay)
5.0/5
(36)

List themeasures that are commonly used to protect the confidentiality of information.

(Essay)
4.8/5
(40)

What is authentication?Provide some examples.

(Essay)
4.8/5
(34)

The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of which process?

(Multiple Choice)
4.8/5
(41)

One form of e-mail attack that is also a DoS attack is called a mail spoof,in which an attacker overwhelms the receiver with excessive quantities of e-mail._________________________

(True/False)
4.8/5
(46)

Communications security involves the protection of which of the following?.

(Multiple Choice)
4.9/5
(38)

A ____________ overflow is an application error that occurs when the system can't handle the amount of data that is sent.

(Short Answer)
4.9/5
(35)

A momentary low voltage is called a(n)____________________.

(Short Answer)
4.9/5
(40)

DoS attacks cannot be launched against routers.

(True/False)
4.9/5
(33)

There are 12 general categories of threat to an organization's people,information,and systems.List at least six of the general categories of threat and identify at least one example of those listed.

(Essay)
4.8/5
(44)

In the____________________attack,an attacker monitors (or sniffs)packets from the network,modifies them,and inserts them back into the network.

(Multiple Choice)
4.8/5
(48)

ESD is the acronym for ____________________ discharge.

(Short Answer)
5.0/5
(41)

Discuss the planning element of information security.

(Essay)
4.8/5
(45)

Which type of attack involves sending a large number of connection or information requests to a target?

(Multiple Choice)
4.9/5
(44)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)