Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

For protection, a company must institute good security measures, which will include firewalls, investigation of personnel to be hired, physical and software security and controls, antivirus software, and internal education measures. These measures are best put in place at the time the system is designed, and careful attention paid to them. A prudent company will engage in disaster protection measures, frequent updating of security software, and frequent auditing of all security measures and of all data upon which the company depends. Full protection may not be feasible in light of the time and expenses involved, but a risk analysis can provide insights into which areas are most important and vulnerable. These are the areas to protect first.

Which of the following statements about wireless security is not true?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

E

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

D

Currently, the protocols used for secure information transfer over the Internet are:

(Multiple Choice)
4.7/5
(40)

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

(True/False)
4.8/5
(44)

The Gramm-Leach-Bliley Act:

(Multiple Choice)
4.9/5
(38)

According to IT security experts, mobile devices pose greater security risks than larger computers.

(True/False)
4.9/5
(31)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.9/5
(39)

An example of phishing is:

(Multiple Choice)
4.8/5
(38)

Zeus is an example of a Trojan horse.

(True/False)
5.0/5
(46)

Most computer viruses deliver a:

(Multiple Choice)
4.9/5
(38)

To secure mobile devices, a company will need to implement special mobile device management software.

(True/False)
4.7/5
(46)

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

(Multiple Choice)
4.9/5
(42)

Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss from this exposure?

(Multiple Choice)
4.9/5
(38)

One form of spoofing involves forging the return address on an email so that the email message appears to come from someone other than the sender.

(True/False)
4.8/5
(31)

Malicious software programs referred to as malware include a variety of threats such as computer viruses, worms, and Trojan horses.

(True/False)
4.8/5
(35)

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

(Multiple Choice)
4.7/5
(29)

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

(True/False)
5.0/5
(34)

An acceptable use policy defines the acceptable level of access to information assets for different users.

(True/False)
4.8/5
(42)

Evil twins are:

(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)