Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Duplication of software-based intellectual property is more commonly known as software ____________________.

(Short Answer)
4.9/5
(46)

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

(Multiple Choice)
4.9/5
(32)

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines? 

(Multiple Choice)
4.9/5
(27)

​Which of the following is not among the 'deadly sins of software security'? 

(Multiple Choice)
4.9/5
(31)

Blackmail threat of informational disclosure is an example of which threat category? 

(Multiple Choice)
4.8/5
(38)

The authorization process takes place before the authentication process.

(True/False)
4.7/5
(30)

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach,so that users who subsequently visit those sites become infected.

(True/False)
4.7/5
(26)

Which of the following is NOT a step in the problem-solving process? 

(Multiple Choice)
5.0/5
(34)

Communications security involves the protection of which of the following?.

(Multiple Choice)
4.8/5
(38)

The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of which process? 

(Multiple Choice)
4.9/5
(39)

The malicious code attack includes the execution of viruses,worms,Trojan horses,and active Web scripts with the intent to destroy or steal information.

(True/False)
4.9/5
(34)

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.

(True/False)
4.7/5
(35)

What do audit logs that track user activity on an information system provide? 

(Multiple Choice)
4.9/5
(30)

List the measures that are commonly used to protect the confidentiality of information.

(Essay)
4.9/5
(33)

The set of organizational guidelines that dictates certain behavior within the organization is called ____________________.

(Short Answer)
4.8/5
(34)

"4-1-9" fraud is an example of a ____________________ attack.

(Multiple Choice)
4.9/5
(44)

DoS attacks cannot be launched against routers.

(True/False)
4.7/5
(38)

What is authentication?  Provide some examples.

(Essay)
4.8/5
(39)

Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? 

(Multiple Choice)
4.8/5
(34)

Attempting to reverse-calculate a password is called ____________________.

(Short Answer)
4.7/5
(38)
Showing 21 - 40 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)