Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a data safeguard against security threats?

(Multiple Choice)
4.7/5
(35)

Technical safeguards involve both software and hardware components of an information system.

(True/False)
4.8/5
(34)

Explain how secure sockets layer works when a user communicates securely with a Web site.

(Essay)
4.8/5
(48)

Explain the types of events that result in faulty service, a type of security loss.

(Essay)
4.7/5
(38)

Explain the functions of the two organizational units responsible for data safeguarding.

(Essay)
4.8/5
(39)

In the case of public key encryption, each site has a private key to encode a message and a public key to decode it.

(True/False)
4.9/5
(35)

________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

(Multiple Choice)
4.8/5
(35)

A(n)________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

(Multiple Choice)
4.7/5
(37)

________ take computers with wireless connections through an area and search for unprotected wireless networks.

(Multiple Choice)
4.7/5
(47)

Backup and recovery against computer security threats are ________.

(Multiple Choice)
4.8/5
(42)

As one of the safeguards against security threats, a person should preferably use the same password for different sites so as to avoid confusion.

(True/False)
4.9/5
(35)

________ occurs when a threat obtains data that is supposed to be protected.

(Multiple Choice)
4.8/5
(45)

Which of the following information should be provided by users of smart cards for authentication?

(Multiple Choice)
4.9/5
(36)

________ a site means to take extraordinary measures to reduce a system's vulnerability.

(Multiple Choice)
4.9/5
(39)

Adware and spyware are similar to each other in that they both ________.

(Multiple Choice)
4.8/5
(33)

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

(Multiple Choice)
4.7/5
(32)

While making online purchases, a person should buy only from vendors who support https.

(True/False)
5.0/5
(36)

What are some of the recommended personal security safeguards against security threats?

(Essay)
4.9/5
(32)

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

(Multiple Choice)
4.8/5
(39)

Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password.Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes.Which of the following techniques is used by Davian to obtain access to his victim's email?

(Multiple Choice)
4.8/5
(38)
Showing 61 - 80 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)