Exam 5: Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Define the meaning of the term "hash".

(Essay)
4.9/5
(35)

The process of encryption converts data into a form called cipher.

(True/False)
4.8/5
(29)

An asymmetric approach to security management means that:

(Multiple Choice)
4.7/5
(30)

The term that describes the privileges that a user has within a system is ________.

(Multiple Choice)
4.8/5
(49)

A janitor brought her children to work in the evening and let them into the server room to use the network server to play games because her computer was already logged on. What control has been broken?

(Multiple Choice)
4.9/5
(40)

Outsourcing IT activities can lead to a loss of control over the entity's business activities.

(True/False)
4.7/5
(46)

S-HTTP is an extension of HTTP that enables individual messages to be encrypted.

(True/False)
4.8/5
(39)

Computer viruses are a major security threat because:

(Multiple Choice)
4.8/5
(33)

Malicious acts include:

(Multiple Choice)
4.9/5
(36)

With current technology, security risks are becoming much less of a concern.

(True/False)
4.8/5
(30)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)