Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

As described in the chapter case, which of the following did hackers use to gain access to the DNC network?

(Multiple Choice)
4.9/5
(42)

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

(Multiple Choice)
4.8/5
(31)

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.9/5
(33)

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

(Multiple Choice)
4.7/5
(37)

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

(Multiple Choice)
4.9/5
(41)

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

(Multiple Choice)
4.9/5
(37)

Which of the following statements about passwords is not true?

(Multiple Choice)
4.7/5
(38)

According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately:

(Multiple Choice)
4.7/5
(42)

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall?

(Multiple Choice)
4.8/5
(47)

Which of the following statements about Internet security is not true?

(Multiple Choice)
4.9/5
(37)

Define computer forensics and describe the types of problems it is designed to address.

(Essay)
4.7/5
(38)

What is a digital certificate? How does it work?

(Essay)
4.9/5
(43)

Symmetric encryption uses two keys.

(True/False)
4.9/5
(44)

All of the following are types of information systems general controls except:

(Multiple Choice)
5.0/5
(40)

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

(Essay)
4.8/5
(37)

Implementation controls:

(Multiple Choice)
4.7/5
(46)

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

(Multiple Choice)
4.9/5
(36)

A Trojan horse:

(Multiple Choice)
4.9/5
(41)

When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:

(Multiple Choice)
4.9/5
(34)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

(Multiple Choice)
4.8/5
(47)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)