Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Spoofing is a technique for intercepting computer communications.

(True/False)
4.9/5
(36)

Incorrectly increasing a customer's discount is an example of incorrect data modification.

(True/False)
4.8/5
(35)

________ is a technique for intercepting computer communications.

(Multiple Choice)
4.7/5
(42)

A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge.

(True/False)
4.8/5
(37)

Explain the functions performed by packet-filtering firewalls.

(Essay)
4.8/5
(40)

A criticism of biometric authentication is that it provides weak authentication.

(True/False)
4.8/5
(36)

There are no standards for tallying costs of computer crime.

(True/False)
5.0/5
(34)

Which of the following statements is true of symmetric encryption?

(Multiple Choice)
4.7/5
(32)

In a brute force attack, a password cracker tries every possible combination of characters.

(True/False)
4.8/5
(34)

Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

(Multiple Choice)
4.8/5
(32)

The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.

(Multiple Choice)
4.9/5
(44)

In terms of password management, when an account is created, users should ________.

(Multiple Choice)
4.9/5
(43)

Hiring, training, and educating employees in an organization is a technical safeguard.

(True/False)
4.8/5
(35)
Showing 81 - 93 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)