Filters
Question type

Study Flashcards

Application controls:


A) can be classified as input controls,processing controls,and output controls.
B) govern the design,security,and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.
D) include software controls,computer operations controls,and implementation controls.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

A) True
B) False

Correct Answer

verifed

verified

The most common type of electronic evidence is:


A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

________ refers to policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems.


A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

To secure mobile devices,a company will need to implement special mobile device management software.

A) True
B) False

Correct Answer

verifed

verified

Electronic data are more susceptible to destruction,fraud,error,and misuse because information systems concentrate data in computer files that:


A) are easily decrypted.
B) can be opened with easily available software.
C) may be accessible by anyone who has access to the same network.
D) are unprotected by up-to-date security systems.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The Internet poses specific security problems because:


A) it was designed to be easily accessible.
B) Internet data is not run over secure lines.
C) Internet standards are universal.
D) it changes so rapidly.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:


A) war driving.
B) sniffing.
C) cybervandalism.
D) driveby tapping.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Computer worms spread much more rapidly than computer viruses.

A) True
B) False

Correct Answer

verifed

verified

Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?

Correct Answer

verifed

verified

Student evaluations will vary,but should...

View Answer

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?


A) SSL
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Smartphones have the same security flaws as other Internet-connected devices.

A) True
B) False

Correct Answer

verifed

verified

Redirecting a Web link to a different address is a form of:


A) snooping.
B) spoofing.
C) sniffing.
D) war driving.

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Why is software quality important to security? What specific steps can an organization take to ensure software quality?

Correct Answer

verifed

verified

Software errors pose a constant threat t...

View Answer

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

A) True
B) False

Correct Answer

verifed

verified

What are the security challenges faced by wireless networks?

Correct Answer

verifed

verified

Wireless networks are vulnerable because...

View Answer

How is the security of a firm's information system and data affected by its people,organization,and technology? Is the contribution of one of these dimensions any more important than the other? Why?

Correct Answer

verifed

verified

There are various technological essentia...

View Answer

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

Correct Answer

verifed

verified

(1)Operational excellence: Security poli...

View Answer

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up.This is an example of:


A) phishing.
B) pharming.
C) spoofing.
D) click fraud.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Large amounts of data stored in electronic form are ________ than the same data in manual form.


A) less vulnerable to damage
B) more secure
C) vulnerable to many more kinds of threats
D) more critical to most businesses

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 61 - 80 of 90

Related Exams

Show Answer