MIS: Securing Information Systems

Only available on StudyMode
  • Download(s) : 295
  • Published : October 18, 2012
Open Document
Text Preview
* Question 1
0 out of 5 points
| |
| Which of the following offers the greatest protection against bot attacks? Answer | | | | | Selected Answer:|    Having corporations use adequate anti-virus protection |
| | | |
* Question 2
5 out of 5 points
| |
| In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? Answer | | | | | Selected Answer:|    Trojan horse |

| | | |
* Question 3
5 out of 5 points
| |
| Large amounts of data stored in electronic form are ________ than the same data in manual form. Answer | | | | | Selected Answer:|    vulnerable to many more kinds of threats |
| | | |
* Question 4
5 out of 5 points
| |
| Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines. Answer | | | | | Selected Answer: |  True|
| | | |
* Question 5
5 out of 5 points
| |
| A firewall allows the organization to: Answer | | | | | Selected Answer:|    enforce a security policy on traffic between its network and the Internet. |
| | | |
* Question 6
0 out of 5 points
| |
| An acceptable use policy defines the acceptable level of access to information assets for different users. Answer | | | | | Selected Answer: |  True|
| | | |
* Question 7
0 out of 5 points
| |
| Electronic evidence on computer storage media that is not visible to the average user is called: Answer | | | | | Selected Answer:|    forensic data. |
| | | |
* Question 8
0 out of 5 points
| |
| Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer. Answer | | | | | Selected Answer: |  True|
| | | |
* Question 9
5 out of 5 points
| |
| The potential for unauthorized access is usually limited to the entry points of a network. Answer | | | | | Selected Answer: |  False|
| | | |
* Question 10
5 out of 5 points
| |
| Biometric authentication is the use of physical characteristics such as retinal images to provide identification. Answer | | | | | Selected Answer: |  True|
| | | |
* Question 11
0 out of 5 points
| |
| The approach taken by Akamai Technologies when it discovered its servers were under attack illustrates that: Answer | | | | | Selected Answer:|    multistep authentication procedures can cause more problems than solutions. |

| | | |
* Question 12
0 out of 5 points
| |
| Currently, the protocols used for secure information transfer over the Internet are: Answer | | | | | Selected Answer:|    TCP/IP and SSL. |
| | | |
* Question 13
0 out of 5 points
| |
| High-availability computing: Answer | | | |
| Selected Answer:|    promises the elimination of recovery time. |
| | | |
* Question 14
5 out of 5 points
| |
| Which of the following is an example of a computer used as an instrument of crime? Answer | | | | | Selected Answer:|    Illegally accessing stored electronic communication |
| | | |
* Question 15
5 out of 5 points
| |
| Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to: Answer | | | | | Selected Answer:|    security. |

| | | |
* Question 16
5 out of 5 points
| |
| NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. Answer | | | | | Selected Answer: |  True|
| | | |
* Question 17
5 out of 5 points
| |
| Online transaction processing requires: Answer | | | | |...
tracking img