Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

A

Organizations use authentication to establish privileges to systems operations.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

True

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

E

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

(Multiple Choice)
4.8/5
(33)

Access controls involve _____ before _____.

(Multiple Choice)
4.8/5
(32)

The cost of a stolen laptop includes all of the following except:

(Multiple Choice)
4.8/5
(34)

Define identity theft, and explain the types of problems that it creates for the victims.

(Not Answered)
This question doesn't have any answer yet
Ask our community

IT security is the responsibility of everyone in the organization.

(True/False)
4.8/5
(40)

Dumpster diving is:

(Multiple Choice)
4.8/5
(34)

A _____ is intellectual work that is known only to a company and is not based on public information.

(Multiple Choice)
4.8/5
(33)

Which of the following statements concerning the difficulties in protecting information resources is not correct?

(Multiple Choice)
4.9/5
(35)

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?

(Multiple Choice)
4.8/5
(28)

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

(Multiple Choice)
4.9/5
(36)

Human errors cause more than half of the security-related problems in many organizations.

(Not Answered)
This question doesn't have any answer yet
Ask our community

In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.

(Multiple Choice)
4.9/5
(30)

Identify and discuss the factors that are contributing to the increasing vulnerability of organizational information assets.

(Not Answered)
This question doesn't have any answer yet
Ask our community

The area located between two firewalls within an organization is called the demilitarized zone.

(True/False)
4.8/5
(34)

Contrast risk acceptance, risk limitation, and risk transference.

(Not Answered)
This question doesn't have any answer yet
Ask our community

An organization's e-mail policy has the least impact on which of the following software attacks?

(Multiple Choice)
4.7/5
(22)

Risk analysis involves determining whether security programs are working.

(True/False)
4.8/5
(44)
Showing 1 - 20 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)