Exam 4: Information Security and Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Backup and recovery procedures are recommended only to safeguard against hardware/software failures.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

Making and distributing information goods to which you do not own the ___ is referred to as ____.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

A

Which of the following can be classified as unintentional threats to information systems caused by human errors?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of

(Multiple Choice)
4.9/5
(32)

Whereas phishing attacks are ____ , denial of service attacks are ____.

(Multiple Choice)
4.9/5
(33)

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.

(Multiple Choice)
4.9/5
(38)

_____ can be used to create strong passwords that are easy to remember.

(Multiple Choice)
4.9/5
(36)

Computer programs like CAPTCHA are used to counter

(Multiple Choice)
4.8/5
(38)

An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:

(Multiple Choice)
4.8/5
(32)

Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.

(Multiple Choice)
4.8/5
(39)

Access controls consist of ____, which confirms user identity, and ____, which determines user access levels.

(Multiple Choice)
5.0/5
(38)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)