Exam 4: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

Contrast the four types of authentication.

Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Verified

not answered

Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim's information security strategy.

(Short Answer)
5.0/5
(38)

An information system's _____ is the possibility that the system will be harmed by a threat.

(Multiple Choice)
4.7/5
(37)

Contrast spyware and spamware.

(Short Answer)
4.9/5
(44)

The security of each computer on the Internet is independent of the security of all other computers on the Internet.

(True/False)
4.8/5
(39)

Compare trade secrets, patents, and copyrights as forms of intellectual property.

(Short Answer)
4.8/5
(32)

Dumpster diving is:

(Multiple Choice)
4.7/5
(40)

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

(Multiple Choice)
4.7/5
(41)

Having one backup of your business data is sufficient for security purposes.

(True/False)
4.8/5
(32)

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

(Multiple Choice)
4.9/5
(33)

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?

(Multiple Choice)
4.8/5
(33)

You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security.

(True/False)
4.8/5
(41)

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.

(True/False)
4.8/5
(28)

A password refers to "something the user is."

(True/False)
4.9/5
(34)

Zero-day attacks use deceptive e-mails to acquire sensitive personal information.

(True/False)
4.9/5
(34)

Which of the following is not a characteristic of strong passwords?

(Multiple Choice)
4.9/5
(35)

Explain why anti-malware software is classified as reactive.

(Short Answer)
4.9/5
(27)

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)