Exam 8: Information Systems Controls for System Reliability Part 1: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.

(Multiple Choice)
4.8/5
(39)

Multi-factor authentication

(Multiple Choice)
4.9/5
(34)

On February 14,2008,students enrolled in an economics course at Swingline College received an email stating that class would be cancelled.The email claimed to be from the professor,but it wasn't.Computer forensic experts determined that the email was sent from a computer in one of the campus labs at 9:14 A.M.They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras revealed the identity of the student responsible for spoofing the class.

(Multiple Choice)
4.8/5
(35)

Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

(Multiple Choice)
4.9/5
(27)

Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?

(Multiple Choice)
5.0/5
(38)

This is used to identify rogue modems (or by hackers to identify targets).

(Multiple Choice)
4.9/5
(34)

The most common input-related vulnerability is

(Multiple Choice)
4.8/5
(35)

If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is

(Multiple Choice)
4.8/5
(47)

Which of the following is not a useful control procedure to control access to system outputs?

(Multiple Choice)
4.8/5
(35)

This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.

(Multiple Choice)
4.8/5
(32)

It was 9:08 A.M.when Jiao Jan,the Network Administrator for Folding Squid Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case

(Multiple Choice)
4.8/5
(35)

Meaningful Discussions is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(an)

(Multiple Choice)
4.9/5
(36)

The process of turning off unnecessary features in the system is known as

(Multiple Choice)
4.8/5
(40)
Showing 41 - 53 of 53
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)