Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The intentional defacement or destruction of a website is called:

(Multiple Choice)
4.9/5
(35)

What are the security challenges faced by wireless networks?

(Essay)
4.9/5
(30)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

(Multiple Choice)
4.8/5
(39)

How does disaster recovery planning differ from business continuity planning?

(Essay)
4.8/5
(38)

SSL is a protocol used to establish a secure connection between two computers.

(True/False)
4.8/5
(33)

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

(Multiple Choice)
4.9/5
(49)

Phishing is a form of spoofing.

(True/False)
4.9/5
(44)

Which of the following focuses primarily on the technical issues of keeping systems up and running?

(Multiple Choice)
4.9/5
(43)

Pharming involves:

(Multiple Choice)
4.8/5
(32)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.9/5
(36)

A statement ranking information risks and identifying security goals would be included in which of the following?

(Multiple Choice)
4.8/5
(37)

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

(Multiple Choice)
4.8/5
(33)

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

(True/False)
4.9/5
(31)

DoS attacks are used to destroy information and access restricted areas of a company's information system.

(True/False)
4.7/5
(37)

Smartphones have the same security flaws as other Internet-connected devices.

(True/False)
4.8/5
(43)

CryptoLocker is an example of which of the following?

(Multiple Choice)
4.9/5
(36)

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

(True/False)
4.9/5
(37)

Most computer viruses deliver a:

(Multiple Choice)
4.8/5
(35)

You have just been hired as a security consultant by MegaMalls Inc., a chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.9/5
(39)

As described in the chapter case, losing smartphones is a rare cause of data breaches.

(True/False)
4.8/5
(35)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)