Exam 10: Information Systems Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements is true about data administration?

(Multiple Choice)
4.7/5
(40)

Technical safeguards involve the hardware and software components of an information system.

(True/False)
5.0/5
(31)

Which of the following is a sniffing technique?

(Multiple Choice)
4.8/5
(38)

Sarah was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Sarah's system is ________.

(Multiple Choice)
4.8/5
(34)

A(n)________ has a microchip in it to hold data.

(Multiple Choice)
4.9/5
(40)

________ present(s)the largest risk for an organization's infrastructure loss.

(Multiple Choice)
4.8/5
(45)

List various personal security safeguards.

(Essay)
4.8/5
(33)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.

(Multiple Choice)
4.8/5
(31)

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.

(Multiple Choice)
4.9/5
(33)

Which of the following is most likely to be a result of hacking?

(Multiple Choice)
4.7/5
(34)

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

(Multiple Choice)
4.9/5
(41)

Secure Sockets Layer (SSL)is a protocol that is restricted to asymmetric encryption.

(True/False)
4.8/5
(40)

Most spyware programs are benign in that they do not perform malicious acts or steal data.

(True/False)
4.7/5
(30)

Discuss some human safeguards for employees that can ensure the security of information systems.

(Essay)
4.9/5
(34)

In information security, which of the following is true about managing risk?

(Multiple Choice)
4.7/5
(45)

Which of the following statements is true about losses due to computer security threats?

(Multiple Choice)
4.7/5
(38)

Define threat, vulnerability, safeguard, and target.

(Essay)
4.9/5
(36)

Most emails and IMs are protected by encryption.

(True/False)
4.8/5
(35)

Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.

(True/False)
4.9/5
(37)

A computer crime is committed if an employee inadvertently installs an old database on top of the current one.

(True/False)
4.7/5
(39)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)