Exam 11: Information Security and Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are included in disaster recovery planning and business continuity management? Are these concepts related?

(Essay)
4.9/5
(36)

Describe the process of using asymmetric-key encryption to authenticate the trading partner involved in e-business.

(Essay)
4.8/5
(32)

A disaster recovery approach should include which of the following elements:

(Multiple Choice)
4.9/5
(29)

When client's accounts payable computer system was relocated,the administrator provided support through a dial-up connection to server.Subsequently,the administrator left the company.No changes were made to the accounts payable system at that time.Which of the following situations represents the greatest security risk?

(Multiple Choice)
4.9/5
(39)

Spam is a self-replicating program that runs and spreads by modifying other programs or files.

(True/False)
4.8/5
(34)

A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location.The data on the tape includes customers' credit card and personal information.Which preventive control(s)should have been used to minimize the potential loss?

(Essay)
4.8/5
(31)

Key distribution and key management are problematic under the symmetric-key encryption.

(True/False)
4.8/5
(39)
Showing 41 - 47 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)