Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The security of each computer on the Internet is independent of the security of all other computers on the Internet.

(True/False)
4.7/5
(34)

Contrast spyware and spamware.

(Not Answered)
This question doesn't have any answer yet
Ask our community

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

(Multiple Choice)
4.8/5
(38)

In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was:

(Multiple Choice)
4.8/5
(34)

Which of the following statements is false?

(Multiple Choice)
4.9/5
(35)

Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA) system.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Which of the following is not a characteristic of strong passwords?

(Multiple Choice)
4.8/5
(42)

Which of the following is not a strategy for mitigating the risk of threats against information?

(Multiple Choice)
4.8/5
(27)

Describe how a digital certificate works.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Organizations utilize layers of controls because they face so many diverse threats to information security.

(True/False)
4.7/5
(36)

Dumpster diving is always illegal because it involves trespassing on private property.

(True/False)
4.8/5
(26)

A _____ is any danger to which an information resource may be exposed.

(Multiple Choice)
4.7/5
(26)

Unintentional threats to information systems include all of the following except:

(Multiple Choice)
4.8/5
(43)

An information system's _____ is the possibility that the system will be harmed by a threat.

(Multiple Choice)
4.8/5
(37)

Biometrics are an example of:

(Multiple Choice)
4.9/5
(35)

Refer to IT's About Business 4.4 - Information Security at City National Bank and Trust: Using the M86 Security software allowed City National Bank and Trust to do all of the following except:

(Multiple Choice)
4.8/5
(32)

Voice recognition is an example of "something a user does" authentication.

(True/False)
4.9/5
(39)

Explain why anti-malware software is classified as reactive.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Refer to IT's About Business 4.3 - The Stuxnet Worm: Which of the following statements is true?

(Multiple Choice)
4.8/5
(40)

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

(Multiple Choice)
4.7/5
(31)
Showing 21 - 40 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)