Exam 13: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements is false?

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

C

The Internet is a(n)___________ network.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

Supervisory control and data acquisition (SCADA)systems require human data input.

(True/False)
4.9/5
(36)

The area located between two firewalls within an organization is called the demilitarized zone.

(True/False)
4.8/5
(35)

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

(Multiple Choice)
4.8/5
(43)

Which of the following is not a characteristic of strong passwords?

(Multiple Choice)
4.9/5
(29)

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

(Multiple Choice)
4.9/5
(35)

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

(Multiple Choice)
5.0/5
(30)

Access controls involve _____ before _____.

(Multiple Choice)
4.9/5
(30)

Voice recognition is an example of "something a user does" authentication.

(True/False)
4.8/5
(35)

You start a new job, and the first thing your new company wants you to do is create a user ID and a password.Which of the following would be a strong password?

(Multiple Choice)
4.8/5
(28)

You receive an e-mail from your bank informing you that they are updating their records and need your password.Which of the following statements is true?

(Multiple Choice)
4.7/5
(35)

Risk analysis involves determining whether security programs are working.

(True/False)
4.9/5
(31)

Which of the following is not an example of a weak password?

(Multiple Choice)
4.9/5
(32)

Risk is the ___________ that a threat will impact information resources.

(Short Answer)
4.8/5
(48)

The cost of a stolen laptop includes all of the following except:

(Multiple Choice)
4.7/5
(29)

Organizations use hot sites, warm sites, and cold sites to insure business continuity.Which of the following statements is not true?

(Multiple Choice)
4.8/5
(34)

The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.

(True/False)
4.9/5
(37)

Unintentional threats to information systems include all of the following except:

(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)