Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cloud computing can potentially generate significant cost savings for an organization.

(True/False)
4.7/5
(40)

A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)

(Multiple Choice)
4.9/5
(42)

The steps that criminals take to identify potential points of remote entry is called

(Multiple Choice)
4.7/5
(42)

________ is/are an example of a detective control.

(Multiple Choice)
4.8/5
(30)

Which of the following is an example of a detective control?

(Multiple Choice)
4.7/5
(36)

New employees of Baker Technologies are assigned user names and appropriate permissions.Each of them were given a company's issued laptop that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)

(Multiple Choice)
4.9/5
(43)

All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(n)

(Multiple Choice)
4.9/5
(36)

Which of the following is not a requirement of effective passwords?

(Multiple Choice)
4.8/5
(41)

Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

(Multiple Choice)
4.8/5
(34)

Describe four requirements of effective passwords .

(Essay)
4.8/5
(34)

The most effective way to protect network resources that are exposed to the internet,yet reside outside of a network is

(Multiple Choice)
4.8/5
(39)

Identify the statement below which is not a useful control procedure regarding access to system outputs.

(Multiple Choice)
4.7/5
(34)

An access control matrix

(Multiple Choice)
4.9/5
(33)

A major financial institution hired a renowned security firm to attempt to compromise its computer network.A few days later,the security firm reported that it had successfully entered the financial institution's computer system without being detected.The security firm presented an analysis of the vulnerabilities that had been found to the financial institution.This is an example of a

(Multiple Choice)
4.8/5
(32)

The most important element of any preventive control is

(Multiple Choice)
4.8/5
(46)

Describe the differences between virtualization and cloud computing.

(Essay)
4.9/5
(37)

Cloud computing is generally more secure than traditional computing.

(True/False)
4.7/5
(36)

The steps that criminals take to find known vulnerabilities and learn how to take advantage of those vulnerabilities is called

(Multiple Choice)
4.9/5
(34)

In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.

(Multiple Choice)
4.9/5
(37)

The most common input-related vulnerability is called the

(Multiple Choice)
4.8/5
(41)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)