Exam 10: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe.The company is heavily dependent on the Internet for transporting data.The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised.Which of the following would be most helpful to the company in achieving this goal?

(Multiple Choice)
4.7/5
(34)

________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source such as an individual within the recipient's company,a government entity,or a well-known company.

(Multiple Choice)
4.8/5
(35)

Redundant data centers can be used to secure the facilities infrastructure of organizations.

(True/False)
4.9/5
(37)

With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.

(Multiple Choice)
4.7/5
(35)

Which of the following can typically be filed for a patent?

(Multiple Choice)
4.9/5
(34)

Robert receives an e-mail which says he has won an online lottery worth $50 billion.Robert had his doubts as he did not remember entering or buying any lottery ticket.It was a spam e-mail intended to obtain the bank account details and the credit card number of Robert.Which of the following is evident here?

(Multiple Choice)
4.9/5
(38)

When using Yahoo Messenger,you get an unsolicited advertisement from a company.This advertisement contains a link to connect to the merchant's Web site.Which of the following is the best way of classifying this advertisement?

(Multiple Choice)
4.9/5
(36)

________ are false messages often circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.

(Multiple Choice)
4.8/5
(23)

Computer crime is defined as the act of using a computer to commit an illegal act.

(True/False)
4.8/5
(32)

WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,can be called ________.

(Multiple Choice)
4.8/5
(39)

________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.

(Multiple Choice)
4.8/5
(30)

An account management policy explains technical controls on all organizational computer systems,such as access limitations,audit-control software,firewalls,and so on.

(True/False)
4.8/5
(39)

Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.

(Multiple Choice)
4.9/5
(40)

The official Web site of the Iranian government was made unreachable by foreign activists seeking to help the opposition parties during the 2009 Iranian election protests.Web sites belonging to many Iranian news agencies were also made unreachable by the activists.This cyber protest is an example of a(n)________ attack.

(Multiple Choice)
4.9/5
(40)

Suggest a few safeguards that organizations can employ to secure their facilities infrastructure.

(Essay)
4.7/5
(43)

Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.

(True/False)
4.9/5
(32)

________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning,recruitment,and numerous other endeavors.

(Multiple Choice)
4.9/5
(35)

Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.

(Multiple Choice)
4.9/5
(26)

A virtual private network is a network connection that is constructed dynamically within an existing network.

(True/False)
4.9/5
(33)

Spyware is electronic junk mail or junk newsgroup postings,posted usually for the purpose of advertising some product and/or service.

(True/False)
4.7/5
(39)
Showing 41 - 60 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)