Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With asymmetric encryption, two different keys are used for encoding and decoding a message.

(True/False)
4.9/5
(41)

Which of the following types of encryption is used by the secure sockets layer protocol?

(Multiple Choice)
4.8/5
(37)

Pretexting occurs when someone deceives by pretending to be someone else.

(True/False)
4.8/5
(31)

In an organization, security sensitivity for each position should be documented.

(True/False)
4.7/5
(38)

What human safeguards should be taken against security threats for temporary personnel, vendors, and partner personnel?

(Essay)
4.8/5
(35)

Malware definitions are patterns that exist in malware code.

(True/False)
4.9/5
(38)

Which of the following statements is true of the financial losses due to computer crimes?

(Multiple Choice)
4.8/5
(34)

A user name authenticates a user, and a password identifies that user.

(True/False)
4.8/5
(29)

The creation of backup copies of database contents makes the data more vulnerable to security threats.

(True/False)
4.8/5
(45)

________ are created by companies as false targets for computer criminals to attack.

(Multiple Choice)
4.9/5
(37)

Describe an incident-response plan.

(Essay)
4.9/5
(36)

Mark receives an email from his bank asking him to update and verify his credit card details.He replies to the email with all the requested details.Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused.Mark is a victim of ________.

(Multiple Choice)
4.8/5
(37)

________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.

(Multiple Choice)
4.9/5
(34)

Wardrivers are those who engage in phishing to obtain unauthorized access to data.

(True/False)
4.8/5
(35)

Thomas is responsible for creating backup copies of information in a system.He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist.Thomas is involved in establishing ________.

(Multiple Choice)
4.7/5
(36)

Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.

(True/False)
4.9/5
(31)

Packet-filtering firewalls are the most sophisticated type of firewall.

(True/False)
4.8/5
(34)

Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.

(True/False)
4.8/5
(26)

Spyware programs are installed on a user's computer without the user's knowledge.

(True/False)
4.8/5
(39)

Discuss briefly the pros and cons of biometric authentication.

(Essay)
4.9/5
(33)
Showing 21 - 40 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)