Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Name and describe four firewall screening technologies.

(Essay)
4.9/5
(41)

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

(Multiple Choice)
4.8/5
(40)

A firewall allows the organization to:

(Multiple Choice)
4.8/5
(36)

In public key encryption the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

(True/False)
4.8/5
(41)

A computer virus replicates more quickly than a computer worm.

(True/False)
4.8/5
(43)

Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.

(Essay)
4.9/5
(38)

The term cracker is used to identify a hacker with criminal or malicious intent.

(True/False)
4.8/5
(30)

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

(Multiple Choice)
4.8/5
(33)

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

(True/False)
4.8/5
(42)

A computer worm is a program that can copy itself to other computers on the network.

(True/False)
4.9/5
(40)

Currently, the protocols used for secure information transfer over the Internet are:

(Multiple Choice)
4.9/5
(31)

Authentication refers to verifying that a person is who he or she claims to be.

(True/False)
4.8/5
(47)

A digital certificate system:

(Multiple Choice)
4.7/5
(38)

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?

(Multiple Choice)
4.9/5
(39)

Application proxy filtering examines the application content of packets.

(True/False)
4.8/5
(34)

Which of the following is not an example of a computer used as a target of crime?

(Multiple Choice)
4.8/5
(34)

The HIPAA Act of 1996:

(Multiple Choice)
4.8/5
(37)

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

(Multiple Choice)
4.8/5
(33)

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

(Multiple Choice)
4.9/5
(38)

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

(Multiple Choice)
4.9/5
(41)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)