Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the three general sources of security threats?

Free
(Essay)
4.9/5
(42)
Correct Answer:
Verified

A security threat is a challenge to the integrity of information systems that arises from one of three sources: human errors and mistakes, computer crime, and natural events and disasters. Human errors and mistakes include accidental problems caused by both employees and nonemployees. Computer crime includes employees and former employees who intentionally destroy data or other system components. It also includes hackers who break into a system and virus and worm writers who infect computer systems. Natural events and disasters include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in this category include not only the initial loss of capability and service, but also losses stemming from actions to recover from the initial problem.

________ are small files that enables a browser to access Web sites without having to sign in every time.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

A

What is the basic information that a security policy must stipulate?

Free
(Essay)
4.8/5
(34)
Correct Answer:
Verified

At a minimum, a security policy should stipulate:
• What sensitive data the organization will store
• How it will process that data
• Whether data will be shared with other organizations
• How employees and others can obtain copies of data stored about them
• How employees and others can request changes to inaccurate data

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

(Multiple Choice)
4.9/5
(37)

A denial-of-service attack is launched when a hacker floods a Web server with millions of bogus service requests.

(True/False)
4.8/5
(33)

What is meant by denial of service?

(Essay)
4.8/5
(35)

Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.

(True/False)
4.8/5
(26)

Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________.

(Multiple Choice)
4.8/5
(29)

Which of the following usually happens in a malicious denial-of-service attack?

(Multiple Choice)
4.7/5
(33)

Which of the following statements is true about the position definitions component of human safeguards?

(Multiple Choice)
4.8/5
(34)

Which of the following statements is true about biometric identification?

(Multiple Choice)
4.7/5
(25)

________ involve the people and procedure components of information systems.

(Multiple Choice)
4.9/5
(30)

What is key escrow?

(Essay)
4.8/5
(37)

Define encryption and explain symmetric and asymmetric encryption for computer systems.

(Essay)
4.9/5
(30)

The process of hardening a Web site is a ________ safeguard.

(Multiple Choice)
4.9/5
(33)

In the context of malware protection, the program code that causes the unwanted actions is called the ________.

(Multiple Choice)
4.9/5
(30)

Key escrow is a(n)________.

(Multiple Choice)
4.9/5
(35)

Spoofing occurs when a person receives a confidential text message by mistake.

(True/False)
4.9/5
(25)

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

(Multiple Choice)
4.9/5
(36)

What is a virus? Differentiate between Trojan horses and worms.

(Essay)
4.9/5
(34)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)