Exam 12: Information Security Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ has a microchip that is loaded with identifying data.

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

A

Organisations should protect sensitive data by storing it in ________ form.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

In a brute force attack,a password cracker tries every possible combination of characters.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

While making online purchases,a person should buy only from vendors who support https.

(True/False)
4.8/5
(29)

Explain the concept of denial of service (DOS)in information management.

(Essay)
4.8/5
(24)

What are the three interdependent factors involved in the enforcement of security policies and procedures in an organisation?

(Essay)
4.8/5
(36)

List some important malware safeguards.

(Short Answer)
4.8/5
(34)

Adware and spyware are similar to each other in that they both ________.

(Multiple Choice)
4.9/5
(33)

Which of the following uses an individual's personal physical characteristics such as fingerprints,facial features,and retinal scans for verification purposes?

(Multiple Choice)
4.8/5
(32)

Explain the two critical security functions that an organisation's senior management needs to address.

(Essay)
4.9/5
(32)

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorised ones.

(Multiple Choice)
4.9/5
(36)

________ are small files that browsers store on users' computers when they visit Web sites.

(Multiple Choice)
4.8/5
(27)

With HTTPS,data are encrypted using a protocol called the ________.

(Multiple Choice)
4.7/5
(42)

Breaking into computers,servers,or networks to steal proprietary and confidential data is referred to as ________.

(Multiple Choice)
4.8/5
(35)

Activity log analyses constitute an important ________ function.

(Multiple Choice)
4.8/5
(23)

The existence of accounts that are no longer necessary do not pose any security threats.

(True/False)
4.8/5
(37)

Risk management is a critical security function of an organisation's senior management.

(True/False)
4.8/5
(32)

Backup and physical security are ________ against computer security threats.

(Multiple Choice)
4.9/5
(35)

Malware protection is an example of a technical safeguard.

(True/False)
4.8/5
(41)

A(n)________ is a sophisticated,possibly long-running,computer hack that is perpetrated by large,well-funded organisations like governments.

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)