Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe briefly a few of the physical threats posed by hackers to information security with examples for each.

(Essay)
4.9/5
(28)

Which of the following are considered sources of information that can potentially be used by social engineers?

(Multiple Choice)
4.7/5
(33)

What are the steps to be taken with respect to firm employees in order to ensure organizational security?

(Essay)
4.7/5
(32)

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

(Multiple Choice)
4.8/5
(38)

In public-key encryption systems, the functions of the public and private keys are interchangeable.

(True/False)
4.9/5
(40)

It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.

(True/False)
4.9/5
(36)

Viruses are programs that infect other software or files and require:

(Multiple Choice)
4.8/5
(27)
Showing 81 - 87 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)