Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.

(True/False)
5.0/5
(38)

Rank the following in terms of dollar value of the crime, from highest to lowest.

(Multiple Choice)
4.8/5
(33)

Define the principle of least privilege, and consider how an organization's senior executives might view the application of this principle.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Which of the following factors is not increasing the threats to information security?

(Multiple Choice)
4.8/5
(37)

Public-key encryption uses two different keys, one public and one private.

(True/False)
4.8/5
(25)

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage.

(True/False)
5.0/5
(34)

Supervisory control and data acquisition (SCADA) systems require human data input.

(True/False)
4.9/5
(38)

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.

(Multiple Choice)
4.7/5
(32)

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

(Multiple Choice)
4.8/5
(38)

Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim's information security strategy.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Having one backup of your business data is sufficient for security purposes.

(True/False)
4.8/5
(37)

Zero-day attacks use deceptive e-mails to acquire sensitive personal information.

(True/False)
4.8/5
(40)

A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security.

(True/False)
4.7/5
(44)

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

(Multiple Choice)
4.8/5
(32)

Which of the following statements concerning firewalls is not true?

(Multiple Choice)
4.9/5
(32)

Voice and signature recognition are examples of:

(Multiple Choice)
4.9/5
(29)

Contrast the four types of authentication.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Cyberterrorism is usually carried out by nations.

(True/False)
4.8/5
(46)

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

(Multiple Choice)
4.9/5
(36)

Which of the following is not a consequence of poor information security practices?

(Multiple Choice)
4.9/5
(42)
Showing 61 - 80 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)