Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems
Exam 8: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 161
Short Answer
A ________ is a device about the size of a credit card that contains a chip formatted with access permission and other data.
Question 162
Multiple Choice
Betty downloaded a peer to peer file sharing program.She is worried that it might have come with spyware attached to it.She had a friend who had a spyware problem where all of her keystrokes were stolen which included her bank passwords.Betty's friend was a victim of ________.
Question 163
Multiple Choice
Statements ranking information risks and identifying security goals are included in a(n)
Question 164
Multiple Choice
Evil twins are
Question 165
Essay
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
Question 166
Multiple Choice
________ planning focuses on how the company can restore business operations after a disaster strikes.
Question 167
True/False
The range of Wi-Fi networks can be extended up to two miles by using external antennae.
Question 168
Short Answer
________ also may involve redirecting a Web link to an address different from the intended one,with the site masquerading as the intended destination.
Question 169
True/False
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
Question 170
True/False
Authentication refers to the ability to know that a person is who he or she claims to be.
Question 171
Short Answer
Large public networks,such as the Internet,are more ________ than internal networks because they are virtually open to anyone.
Question 172
True/False
Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers outside the organization's control.
Question 173
Short Answer
________ are independent computer programs that copy themselves from one computer to other computers over a network.
Question 174
Multiple Choice
How do software vendors correct flaws in their software after it has been distributed?
Question 175
Multiple Choice
An independent computer program that copies itself from one computer to another over a network is called a
Question 176
Short Answer
A ________ is a physical device,similar to an identification card,that is designed to prove the identity of a single user.
Question 177
Multiple Choice
________ defects cannot be achieved in larger programs.
Question 178
True/False
The Conficker worm uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely.
Question 179
True/False
The Sasser.ftp worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book.Infected 15 to 29 percent of all business PCs,causing $300 million to $600 million in damage.