Exam 8: Information Systems Controls for System Reliability Part 1: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.

(Multiple Choice)
4.9/5
(39)

Murray Snitzel called a meeting of the top management at Snitzel Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."This is your responsibility! What do you intend to do?" Which of the following is the best answer?

(Multiple Choice)
4.8/5
(46)

The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

(Multiple Choice)
4.8/5
(34)

Describe four requirements of effective passwords .

(Essay)
4.7/5
(35)

In 2007,a major U.S.financial institution hired a security firm to attempt to compromise its computer network.A week later,the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.This is an example of a

(Multiple Choice)
4.7/5
(40)

Which of the following is not one of the three fundamental information security concepts?

(Multiple Choice)
4.9/5
(37)

This network access control determines which IP packets are allowed entry to a network and which are dropped.

(Multiple Choice)
4.8/5
(28)

The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as

(Multiple Choice)
4.9/5
(29)

This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.

(Multiple Choice)
4.9/5
(36)

Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as

(Multiple Choice)
4.8/5
(35)

Identify three ways users can be authenticated and give an example of each.

(Essay)
4.7/5
(38)

Which of the following is an example of a detective control?

(Multiple Choice)
4.7/5
(33)

Verifying the identity of the person or device attempting to access the system is

(Multiple Choice)
4.8/5
(33)

When new employees are hired by Folding Squid Technologies,they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(an)

(Multiple Choice)
4.7/5
(32)

According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that

(Multiple Choice)
4.9/5
(38)

Which of the following is an example of a corrective control?

(Multiple Choice)
5.0/5
(35)

There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

(Multiple Choice)
4.8/5
(44)

This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

(Multiple Choice)
4.9/5
(36)

Explain social engineering.

(Essay)
4.8/5
(40)

The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 53
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)