Exam 26: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Information security policies detail how an organization will implement the information security plan.

(True/False)
4.9/5
(44)

_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

(Short Answer)
4.7/5
(23)

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

(Multiple Choice)
4.9/5
(38)

Summarize the five steps to creating an information security plan.

(Essay)
4.9/5
(30)

Describe the relationship between information security policies and an information security plan.

(Essay)
4.8/5
(35)

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

(True/False)
4.9/5
(35)

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

(True/False)
4.7/5
(35)

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

(Multiple Choice)
4.8/5
(34)

If there is a security breach on your organizational information systems,which information security area is best suited to handle the breach?

(Multiple Choice)
4.9/5
(28)

Which of the following does a firewall perform?

(Multiple Choice)
4.9/5
(37)

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

(Short Answer)
4.9/5
(39)

What is the recommended way to implement information security lines of defense?

(Multiple Choice)
4.8/5
(35)

_______________ is a hacker with criminal intent.

(Short Answer)
4.9/5
(28)

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

(Short Answer)
4.7/5
(32)

____________ is the identification of a user based on a physical characteristic.

(Short Answer)
4.8/5
(28)

What attacks computer systems by transmitting a virus hoax,with a real virus attached?

(Multiple Choice)
4.8/5
(31)

Describe authentication and the most secure type of authentication.

(Essay)
4.8/5
(40)

What is spam?

(Multiple Choice)
4.7/5
(24)

List and describe the three primary security areas.

(Essay)
4.9/5
(38)

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

(Short Answer)
4.9/5
(31)
Showing 41 - 60 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)