IS Final Exam

IS 4410

13 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
An example of malicious human activity could include an employee who, in the course of backing up a database, inadvertently installs an old database on top of the current one.A. TrueB. False
A. True B. False Answer: FALSE
Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks. A. TrueB. False
A. True B. False Answer: FALSE
The IT department should set the security policy for an organization. A. TrueB. False
A. True B. False Answer: FALSE
HIPAA sets limits on who can receive your health information.A. TrueB. False
A. True B. False Answer: TRUE
Encryption is an example of a technical safeguard. A. TrueB. False
A. True B. False Answer: TRUE
The ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.A. hawkerB. phisherC. spooferD. sniffer

Answer: B
Which of the following usually happens in a malicious denial-of-service attack? A. A hacker monitors and intercepts wireless traffic at will. B. A hacker floods a Web server with millions of bogus service requests. C. A hacker uses unauthorized programs to invade a computer system and replace legitimate programs. D. A phisher pretends to be a legitimate company and sends an email requesting confidential data.
Answer: B
Which of the following is a critical security function of senior-management involvement? safeguarding computer hardware and softwareB. planning response to security incidentsC. establishing the security policyD. managing the security program on a real-time basis

Answer: C
Which of the following is an example of a technical safeguard?A. backup and recoveryB. encryptionC. procedure designD. compliance

Answer: B
A security policy covering personal use of computers at work would be an example of a ________. A. data policy B. issue-specific policy C. system-specific policy D. personnel policy
Answer: B
Which of the following is used for biometric authentication? A. smart cards B. facial features C. passwords D. chromosome data
Answer: B
________ encryption uses the same key for both parties. A. Symmetric B. Asymmetric C. SSL D. TLS
Answer: A
You are doing an online fund transfer through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol? A. http:// B. www3 C. https:// D. .com
Answer: C