Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.9/5
(34)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.9/5
(49)

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.9/5
(44)

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

(True/False)
4.9/5
(32)

Name and describe four firewall screening technologies.

(Essay)
4.7/5
(32)

All of the following are types of information systems general controls except:

(Multiple Choice)
4.9/5
(35)

An independent computer program that copies itself from one computer to another over a network is called a:

(Multiple Choice)
4.8/5
(40)

Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?

(Multiple Choice)
4.8/5
(48)

The most common type of electronic evidence is:

(Multiple Choice)
4.7/5
(35)

Which of the following is not an example of a computer used as an instrument of crime?

(Multiple Choice)
5.0/5
(44)

According to Ponemon Institute's 2014 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:

(Multiple Choice)
4.8/5
(38)

Which of the following statements about botnets is not true?

(Multiple Choice)
4.9/5
(35)

Which of the following statements about Internet security is not true?

(Multiple Choice)
4.8/5
(37)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
4.9/5
(42)

Specific security challenges that threaten the communications lines in a client/server environment include:

(Multiple Choice)
4.9/5
(36)

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

(Multiple Choice)
4.8/5
(36)

Authorization refers to the ability to know that a person is who he or she claims to be.

(True/False)
4.7/5
(43)

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

(True/False)
4.9/5
(27)

Public key encryption uses two keys.

(True/False)
4.7/5
(37)

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

(Essay)
4.9/5
(35)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)