Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.7/5
(36)

For 100 percent availability, online transaction processing requires:

(Multiple Choice)
4.9/5
(33)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

(Multiple Choice)
4.9/5
(42)

All of the following countries are popular sources of malware attacks except:

(Multiple Choice)
4.9/5
(37)

An authentication token:

(Multiple Choice)
4.8/5
(41)

Packet filtering catches most types of network attacks.

(True/False)
4.7/5
(42)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.9/5
(43)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Multiple Choice)
4.9/5
(30)

A firewall allows the organization to:

(Multiple Choice)
4.8/5
(34)

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):

(Multiple Choice)
4.9/5
(37)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.8/5
(43)

A digital certificate system:

(Multiple Choice)
4.9/5
(36)

Viruses cannot be spread through email.

(True/False)
4.8/5
(29)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.9/5
(40)

Which of the following focuses primarily on the technical issues of keeping systems up and running?

(Multiple Choice)
4.8/5
(35)

Pharming involves:

(Multiple Choice)
4.8/5
(43)

Computer forensics tasks include all of the following except:

(Multiple Choice)
4.9/5
(35)

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

(True/False)
4.8/5
(45)

CryptoLocker is an example of which of the following?

(Multiple Choice)
4.9/5
(34)

Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?

(Multiple Choice)
4.7/5
(28)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)