Exam 5: Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A public key infrastructure relies on which of the following?

(Multiple Choice)
4.9/5
(41)

List the major components of a security policy.

(Essay)
4.8/5
(32)

How does drive-by hacking work?

(Essay)
4.8/5
(32)

A company can build its security platform on public key infrastructure.

(True/False)
4.8/5
(30)

All applications that a business uses require controls for input, processing, output, storage, and:

(Multiple Choice)
4.7/5
(39)

The most accurate description of a firewall would be:

(Multiple Choice)
4.8/5
(35)

A security policy for a firm should deal with:

(Multiple Choice)
4.9/5
(44)

Firewalls are only one component of an overall security program.

(True/False)
4.8/5
(36)

A potential problem with some Intrusion Detection Systems is the generation of a large volume of ________.

(Multiple Choice)
4.8/5
(47)

Digital certificates are used to:

(Multiple Choice)
4.8/5
(33)

An entity's security program must address all but the following:

(Multiple Choice)
4.7/5
(34)

The most basic privilege in a computerized business system is ________.

(Multiple Choice)
4.8/5
(35)

Explain the "principle of least privilege".

(Essay)
4.9/5
(39)

The primary purpose of a firewall is to:

(Multiple Choice)
4.8/5
(31)

The following statement best describes encryption on the internet:

(Multiple Choice)
4.7/5
(42)

The encryption of information is all that is needed to ensure that a network is safe from attacks.

(True/False)
4.8/5
(29)

Software development within a firm:

(Multiple Choice)
4.8/5
(36)

What pair of "keys" is used to encrypt and decrypt messages and other data transmissions?

(Short Answer)
4.9/5
(39)

Secure socket layer (SSL) is:

(Multiple Choice)
4.9/5
(38)

List six categories included in general controls.

(Essay)
4.9/5
(38)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)