Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Study Set 1
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Some of the most common guidelines issued by Web sites when designing a secure password include:
Question 42
True/False
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
Question 43
True/False
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
Question 44
Essay
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
Question 45
True/False
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.
Question 46
Multiple Choice
What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?
Question 47
Essay
What are botnets and how are criminals using this technology?
Question 48
True/False
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
Question 49
Multiple Choice
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n) :
Question 50
Multiple Choice
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of: