Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A foreign country attempting to access government networks in order to disable a national power grid would be an example of:

(Multiple Choice)
4.8/5
(37)

Specific security challenges that threaten corporate servers in a client/server environment include:

(Multiple Choice)
4.8/5
(37)

What are the security challenges faced by the use of wireless networks?

(Essay)
4.8/5
(38)

Statements ranking information risks and identifying security goals are included in a(n):

(Multiple Choice)
4.9/5
(37)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.7/5
(34)

How does disaster recovery planning differ from business continuity planning?

(Essay)
4.8/5
(36)

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

(Multiple Choice)
4.8/5
(39)

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:

(Multiple Choice)
4.9/5
(47)

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

(Multiple Choice)
4.8/5
(47)

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:

(Multiple Choice)
4.8/5
(34)

Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.

(Essay)
4.9/5
(31)

Define computer forensics and describe the types of problems it is designed to address.

(Essay)
4.8/5
(39)

Conficker (also known as Downadup or Downup) is an example of which of the following?

(Multiple Choice)
4.8/5
(40)

Redirecting a web link to a different address is a form of:

(Multiple Choice)
4.8/5
(36)

Smartphones are not vulnerable to browser-based malware.

(True/False)
4.7/5
(43)

Explain how two-factor authentication increases security.

(Essay)
4.9/5
(36)

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

(Multiple Choice)
4.7/5
(31)

Computer worms spread much more rapidly than computer viruses.

(True/False)
4.7/5
(41)

A keylogger is a type of:

(Multiple Choice)
4.9/5
(45)

The HIPAA Act of 1996:

(Multiple Choice)
4.8/5
(38)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)