Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe public key encryption.

(Not Answered)
This question doesn't have any answer yet
Ask our community

A _____ is a document that grants the holder exclusive rights on an invention for 20 years.

(Multiple Choice)
4.8/5
(39)

Compare trade secrets, patents, and copyrights as forms of intellectual property.

(Not Answered)
This question doesn't have any answer yet
Ask our community

The computing skills necessary to be a hacker are decreasing.

(True/False)
4.7/5
(37)

Passwords and passphrases are examples of:

(Multiple Choice)
4.8/5
(37)

You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security.

(True/False)
4.8/5
(35)

A password refers to "something the user is."

(True/False)
4.7/5
(35)

Refer to IT's About Business 4.2 - Virus Attack Hits the University of Exeter. Which of the following statements about the virus attack is true?

(Multiple Choice)
4.9/5
(40)

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.

(Multiple Choice)
4.8/5
(33)

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

(Multiple Choice)
4.7/5
(39)

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

(Multiple Choice)
4.8/5
(44)

Contrast unintentional and deliberate threats to an information resource. Provide examples of both.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Employees in which functional areas of the organization pose particularly grave threats to information security?

(Multiple Choice)
4.9/5
(41)

In _____, the organization purchases insurance as a means to compensate for any loss.

(Multiple Choice)
4.9/5
(34)

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.

(Multiple Choice)
4.9/5
(39)

Compare a hot site, a warm site, and a cold site as strategies for business continuity.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Software can be copyrighted.

(True/False)
4.9/5
(34)

Refer to Opening Case - Cybercriminals Use Social Networks for Targeted Attacks: Cybercriminals use Facebook for all of the following reasons except:

(Multiple Choice)
4.8/5
(34)

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.

(Multiple Choice)
4.8/5
(35)

Cybercriminals can obtain the information they need in order to assume another person's identity by:

(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)