Exam 10: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Logic bombs are variations of Trojan horses that can reproduce themselves to disrupt the normal functioning of a computer.

(True/False)
4.8/5
(39)

RBS Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a counter measure the company installs strong firewalls and protective software.These steps are a part of a ________ strategy.

(Multiple Choice)
4.7/5
(35)

What is risk analysis? What are the three ways in which organizations react to perceived risks?

(Essay)
4.9/5
(32)

What is unauthorized access? Provide a few examples of unauthorized access.

(Essay)
4.8/5
(37)

A hacker takes an individual's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to run up debts that are never repaid.This practice is called ________.

(Multiple Choice)
4.9/5
(38)

In ________,an attacker accesses the network,intercepts data from it,and even uses network services and/or sends attack instructions to it without having to enter the home,office,or organization that owns the network.

(Multiple Choice)
4.9/5
(32)

Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.

(True/False)
4.7/5
(38)

________ targeted at networks,is designed to spread by itself,without the need for an infected host file to be shared.

(Multiple Choice)
4.9/5
(40)

A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.

(True/False)
4.9/5
(37)

The Computer Fraud and Abuse Act of 1986 prohibits ________.

(Multiple Choice)
4.9/5
(25)

Ronald downloads a movie from the Internet onto his company's computer.During this process,his system gets affected by a virus.The virus spreads rapidly in the company's network and causes the server to crash.This type of virus is most likely to be ________.

(Multiple Choice)
5.0/5
(30)

A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.

(Multiple Choice)
4.9/5
(36)

________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.

(Multiple Choice)
4.8/5
(39)

________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.

(Multiple Choice)
4.8/5
(36)

Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls.This process is called ________.

(Multiple Choice)
4.8/5
(31)

Which of the following is a valid observation about encryption?

(Multiple Choice)
4.9/5
(44)

Recovery point objectives of a recovery plan specify ________.

(Multiple Choice)
4.8/5
(38)

Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?

(Multiple Choice)
4.8/5
(34)

Employees steal time on company computers to do personal business.This is a form of unauthorized access.

(True/False)
4.9/5
(40)

A cookie is a message passed to a Web browser on a user's computer by a Web server.

(True/False)
4.8/5
(34)
Showing 81 - 100 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)