Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Existence of accounts that are no longer necessary does not pose a security threat.

(True/False)
4.8/5
(45)

A(n)________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.

(Multiple Choice)
4.8/5
(42)

Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

(Multiple Choice)
4.9/5
(37)

Explain the concept of denial of service (DOS)in information management.

(Essay)
4.9/5
(39)

A ________ is a plastic card that has a microchip loaded with identifying data.

(Multiple Choice)
4.8/5
(41)

Explain how defining positions in an organization can safeguard against security threats.

(Essay)
4.9/5
(40)

IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.

(True/False)
4.7/5
(32)

Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

(Multiple Choice)
4.9/5
(39)

What are the two critical security functions that an organization's senior management needs to address?

(Essay)
4.7/5
(42)

Incident-response plans should provide centralized reporting of all security incidents.

(True/False)
4.8/5
(36)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

(Multiple Choice)
4.8/5
(30)

A key is a number used with an encryption algorithm to encrypt data.

(True/False)
4.9/5
(44)

A(n)________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.

(Multiple Choice)
4.8/5
(34)

Which of the following is a synonym for phishing?

(Multiple Choice)
4.8/5
(31)

The loss of encryption keys by employees is referred to as key escrow.

(True/False)
4.9/5
(40)

Most secure communications over the Internet use a protocol called ________.

(Multiple Choice)
4.9/5
(41)

Which of the following is a human safeguard against security threats?

(Multiple Choice)
4.9/5
(42)

A help-desk information system has answers to questions that only a true user of an account or system would know.

(True/False)
4.7/5
(40)

Malware protection is an example of a technical safeguard.

(True/False)
4.9/5
(41)

Which of the following is a technical safeguard against security threats?

(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)