Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access.

(Multiple Choice)
4.7/5
(27)

Symmetric encryption is simpler and much faster than asymmetric encryption.

(True/False)
4.9/5
(27)

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

(Multiple Choice)
4.9/5
(32)

Faulty service excludes problems that result due to incorrect data modification.

(True/False)
4.8/5
(35)

Email spoofing is a synonym for phishing.

(True/False)
4.9/5
(34)

Phishing is a technique for intercepting computer communications.

(True/False)
4.9/5
(36)

How will computer crime change in the coming years?

(Essay)
4.8/5
(39)

One of the personal security safeguards is to use https at trusted, reputable vendors.

(True/False)
4.7/5
(34)

How should organizations respond to security incidents?

(Essay)
4.9/5
(39)

Users of smart cards are required to enter a ________ to be authenticated.

(Multiple Choice)
4.9/5
(31)

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system.

(Multiple Choice)
4.9/5
(37)

The losses due to human error are minimal, and hence, organizations tend to ignore these losses.

(True/False)
4.7/5
(28)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.8/5
(37)

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

(Multiple Choice)
4.9/5
(42)

Business requirements do not necessitate opening information systems to nonemployee personnel, such as temporary personnel, vendors, or partner personnel.

(True/False)
4.8/5
(34)

Packet-filtering firewalls ________.

(Multiple Choice)
4.8/5
(40)

With ________, the sender and receiver transmit a message using different keys.

(Multiple Choice)
4.8/5
(43)

John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility?

(Multiple Choice)
4.7/5
(28)

Cookies enable an individual to access Web sites without having to sign in every time.

(True/False)
5.0/5
(44)

Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.

(Multiple Choice)
4.7/5
(35)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)