Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Smart cards are convenient to use because they do not require a personal identification number for authentication.

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

False

A(n)________ sits outside an organizational network and is the first device that Internet traffic encounters.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

B

With https, data are encrypted using a protocol called the ________.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.

(True/False)
4.8/5
(36)

A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.

(Multiple Choice)
4.8/5
(27)

Technical safeguards include encryption and usage of passwords.

(True/False)
4.8/5
(37)

Viruses, worms, and Trojan horses are types of firewalls.

(True/False)
4.9/5
(30)

A(n)________ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.

(Multiple Choice)
4.8/5
(41)

Risk management is a critical security function addressed by an organization's senior management.

(True/False)
4.9/5
(33)

________ are small files that browsers store on users' computers when they visit Web sites.

(Multiple Choice)
4.9/5
(36)

Financial institutions must invest heavily in security safeguards because they are obvious targets for theft.

(True/False)
4.9/5
(41)

What are the precautions to be taken when opening email attachments to avoid malwares?

(Essay)
4.7/5
(34)

Every information system today should require users to sign on with a user name and a password.In this case, which of the following functions is performed by the user's password?

(Multiple Choice)
4.8/5
(37)

Which of the following statements is true of position sensitivity?

(Multiple Choice)
4.9/5
(29)

To safeguard data against security threats, every information system today requires a user name and a password.In this case, which of the following functions is performed by the user name?

(Multiple Choice)
4.8/5
(30)

Which of the following is considered a personal security safeguard?

(Multiple Choice)
4.8/5
(39)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.9/5
(33)

A virus is a computer program that replicates itself.

(True/False)
4.8/5
(35)

________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.

(Multiple Choice)
4.8/5
(37)

A(n)________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)