Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer forensics tasks include all of the following except:

(Multiple Choice)
4.9/5
(38)

The Sarbanes-Oxley Act:

(Multiple Choice)
4.8/5
(34)

Most IoT devices support sophisticated security approaches.

(True/False)
4.9/5
(43)

All of the following are currently being used as traits that can be profiled by biometric authentication except:

(Multiple Choice)
4.7/5
(39)

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

(Multiple Choice)
4.8/5
(35)

Explain how two-factor authentication increases security.

(Essay)
4.8/5
(37)

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

(Multiple Choice)
4.8/5
(31)

Which of the following is the single greatest cause of network security breaches?

(Multiple Choice)
4.8/5
(42)

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.8/5
(38)

Which of the following statements about wireless security is not true?

(Multiple Choice)
5.0/5
(30)

Two-factor authentication utilizes a(n):

(Multiple Choice)
4.7/5
(38)

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.

(True/False)
5.0/5
(38)

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

(True/False)
4.9/5
(31)

According to the 2017 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2016?

(Multiple Choice)
4.9/5
(34)

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

(True/False)
5.0/5
(40)

Which of the following is an example of a keylogger?

(Multiple Choice)
4.9/5
(30)

When hackers gain access to a database containing your personal private information, this is an example of:

(Multiple Choice)
4.8/5
(36)

What is the role of an information systems audit?

(Essay)
4.8/5
(42)

Which of the following is a type of ambient data?

(Multiple Choice)
4.9/5
(36)

________ identify the access points in a Wi-Fi network.

(Multiple Choice)
4.9/5
(29)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)