Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Sarbanes-Oxley Act:

(Multiple Choice)
4.8/5
(37)

Which of the following sued BJ's Wholesale Club for allowing hackers to access its systems and steal credit and debit card data for fraudulent purchases?

(Multiple Choice)
5.0/5
(41)

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

(Multiple Choice)
4.8/5
(39)

Phishing is a form of:

(Multiple Choice)
4.9/5
(33)

All of the following have contributed to an increase in software flaws except:

(Multiple Choice)
4.7/5
(29)

What is the role of an information systems audit?

(Essay)
4.7/5
(40)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.8/5
(42)

Wireless networks are more difficult to penetrate because radio frequency bands are hard to scan.

(True/False)
4.7/5
(38)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.8/5
(35)

What is a digital certificate? How does it work?

(Essay)
4.8/5
(36)

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.9/5
(28)

Which of the following statements about passwords is not true?

(Multiple Choice)
4.9/5
(31)

A walkthrough is a type of software testing used before software is even written.

(True/False)
4.9/5
(41)

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.9/5
(33)

According to the 2015 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2014?

(Multiple Choice)
4.7/5
(34)

Specific security challenges that threaten clients in a client/server environment include:

(Multiple Choice)
5.0/5
(38)

Which of the following is the single greatest cause of network security breaches?

(Multiple Choice)
4.8/5
(35)

Application controls:

(Multiple Choice)
4.8/5
(32)

Which of the following is a type of ambient data?

(Multiple Choice)
4.8/5
(37)

All of the following are currently being used as traits that can be profiled by biometric authentication except:

(Multiple Choice)
4.9/5
(45)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)