Exam 8: Information Systems Controls for System Reliability Part 1: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process that maintains a table that lists all established connections between the organization's computers and the Internet,to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

C

Which of the following is the most effective method of protecting against social engineering attacks on a computer system?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

Which of the following is an example of a preventive control?

(Multiple Choice)
4.7/5
(36)

Which of the following is commonly true of the default settings for most commercially available wireless access points?

(Multiple Choice)
4.9/5
(33)

Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

(Multiple Choice)
4.8/5
(46)

The most effective way to protect network resources,like email servers,that are outside of the network and are exposed to the Internet is

(Multiple Choice)
4.9/5
(32)

This creates logs of network traffic that was permitted to pass the firewall.

(Multiple Choice)
4.8/5
(40)

Describe the function of a computer incident response team (CIRT)and the steps that a CIRT should perform following a security incident.

(Essay)
4.8/5
(28)

All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(an)

(Multiple Choice)
4.8/5
(34)

Restricting access of users to specific portions of the system as well as specific tasks,is

(Multiple Choice)
4.9/5
(33)

A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)

(Multiple Choice)
4.8/5
(39)

The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as

(Multiple Choice)
4.8/5
(37)

When new employees are hired by Folding Squid Technologies,they are assigned user names and appropriate permissions are entered into the information system's access control matrix.This is an example of a(an)

(Multiple Choice)
4.8/5
(37)

Explain the value of penetration testing.

(Essay)
4.9/5
(39)

The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)

(Multiple Choice)
4.8/5
(24)

Which of the following is not a requirement of effective passwords?

(Multiple Choice)
4.9/5
(32)

A well-known hacker started his own computer security consulting business shortly after being released from prison.Many companies pay him to attempt to gain unauthorized access to their network.If he is successful,he offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?

(Multiple Choice)
4.7/5
(40)

Identify six physical access controls.

(Essay)
4.8/5
(34)

An access control matrix

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 53
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)