Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 61
True/False
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
Question 62
True/False
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
Question 63
True/False
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.
Question 64
Multiple Choice
In security circles the phrase "compliance" refers to:
Question 65
True/False
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
Question 66
Multiple Choice
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
Question 67
Multiple Choice
What is the key takeaway from the Heartland breach?
Question 68
True/False
Web sites of reputed companies can also be sources of malware.
Question 69
Short Answer
_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
Question 70
Multiple Choice
Some of the most common guidelines issued by Web sites when designing a secure password include:
Question 71
True/False
Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.
Question 72
Multiple Choice
The term _____ originally referred to a particularly skilled programmer.
Question 73
Multiple Choice
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of: