Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.

(Multiple Choice)
4.9/5
(33)

True or False: Cloud computing can potentially generate significant cost savings for an organization.

(True/False)
4.8/5
(40)

When new employees are hired by Pacific Technologies,they are assigned user names and appropriate permissions are entered into the information system's access control matrix.This is an example of a(n)

(Multiple Choice)
4.9/5
(35)

The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as

(Multiple Choice)
4.7/5
(48)

This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

(Multiple Choice)
4.9/5
(35)

Describe what information security process the term hardening refers to.

(Essay)
4.7/5
(35)

The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as

(Multiple Choice)
4.8/5
(37)

________ is/are an example of a preventive control.

(Multiple Choice)
4.8/5
(39)

The process of turning off unnecessary features in the system is known as

(Multiple Choice)
4.9/5
(46)

Which of the following is not one of the three fundamental information security concepts?

(Multiple Choice)
4.9/5
(36)

A border router

(Multiple Choice)
4.8/5
(30)

True or False: Cloud computing is generally more secure than traditional computing.

(True/False)
4.9/5
(39)

Identify the primary means of protecting data stored in a cloud from unauthorized access.

(Multiple Choice)
4.9/5
(40)

The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

(Multiple Choice)
4.7/5
(44)

This network access control determines which IP packets are allowed entry to a network and which are dropped.

(Multiple Choice)
4.9/5
(36)

There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

(Multiple Choice)
4.8/5
(37)

The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as

(Multiple Choice)
4.7/5
(43)

Verifying the identity of the person or device attempting to access the system is an example of

(Multiple Choice)
4.9/5
(46)

In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.

(Multiple Choice)
4.8/5
(38)

Restricting access of users to specific portions of the system as well as specific tasks,is an example of

(Multiple Choice)
4.9/5
(47)
Showing 41 - 60 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)