Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following have contributed to an increase in software flaws except:

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

E

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

B

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

(Essay)
4.8/5
(39)

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

(Essay)
4.8/5
(41)

The Gramm-Leach-Bliley Act:

(Multiple Choice)
4.8/5
(31)

Fault tolerant information systems offer 100 percent availability because they use:

(Multiple Choice)
4.9/5
(42)

WPA2 is a more effective way to secure a wireless network than WEP because it:

(Multiple Choice)
4.8/5
(34)

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

(Multiple Choice)
4.7/5
(43)

Evil twins are:

(Multiple Choice)
4.8/5
(42)

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.7/5
(35)

Which of the following statements about botnets is not true?

(Multiple Choice)
4.8/5
(36)

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

(Multiple Choice)
4.8/5
(39)

In cloud computing, accountability and responsibility for protection of sensitive data is transferred to the cloud provider.

(True/False)
4.9/5
(42)

Packet filtering catches most types of network attacks.

(True/False)
4.8/5
(37)

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

(True/False)
4.9/5
(41)

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

(True/False)
4.9/5
(39)

Blockchain refers to a technology that:

(Multiple Choice)
4.8/5
(42)

Organizations can use existing network security software to secure mobile devices.

(True/False)
4.8/5
(40)

________ is spyware that logs and transmits everything a user types.

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)