Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe four requirements of effective passwords .

(Essay)
4.9/5
(39)

A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)

(Multiple Choice)
4.7/5
(40)

Which of the following is not a requirement of effective passwords?

(Multiple Choice)
4.8/5
(32)

Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

(Multiple Choice)
4.7/5
(42)

Identify six physical access controls.

(Essay)
4.9/5
(34)

Virtualization refers to the ability of

(Multiple Choice)
4.8/5
(37)

The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.

(Multiple Choice)
4.8/5
(37)

Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as

(Multiple Choice)
4.7/5
(32)

Why does COBIT5 DSS-05.06 stress the importance of restricting physical access to network printers?

(Multiple Choice)
4.8/5
(30)
Showing 61 - 69 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)