Filters
Question type

Study Flashcards

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines? 


A)  planning
B)  policy 
C)  programs
D)  people

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Blackmail threat of informational disclosure is an example of which threat category? 


A)  Espionage or trespass
B)  Information extortion 
C)  Sabotage or vandalism
D)  Compromises of intellectual property

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

List the measures that are commonly used to protect the confidentiality of information.

Correct Answer

verifed

verified

Information classificationSecu...

View Answer

What is authentication?  Provide some examples.

Correct Answer

verifed

verified

Authentication is the process by which a...

View Answer

Communications security involves the protection of which of the following?.


A)  radio handsets
B)  people, physical assets 
C)  the IT department
D)  media, technology, and content

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? 


A)  accountability
B)  authorization 
C)  identification
D)  authentication

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.


A)  bypass
B)  theft 
C)  trespass
D)  security

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The malicious code attack includes the execution of viruses,worms,Trojan horses,and active Web scripts with the intent to destroy or steal information.

A) True
B) False

Correct Answer

verifed

verified

​Which of the following is not among the 'deadly sins of software security'? 


A)  ​Extortion sins 
B)  Implementation sins 
C)  ​Web application sins 
D)  ​Networking sins

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

"4-1-9" fraud is an example of a ____________________ attack.


A)  social engineering
B)  virus 
C)  worm
D)  spam

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is NOT a step in the problem-solving process? 


A)  Select, implement and evaluate a solution 
B)  Analyze and compare possible solutions 
C)  Build support among management for the candidate solution 
D)  Gather facts and make assumptions

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The authorization process takes place before the authentication process.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? 


A)  organization
B)  planning 
C)  controlling
D)  leading

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

DoS attacks cannot be launched against routers.

A) True
B) False

Correct Answer

verifed

verified

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.

A) True
B) False

Correct Answer

verifed

verified

What do audit logs that track user activity on an information system provide? 


A)  identification
B)  authorization 
C)  accountability
D)  authentication

E) All of the above
F) None of the above

Correct Answer

verifed

verified

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach,so that users who subsequently visit those sites become infected.

A) True
B) False

Correct Answer

verifed

verified

Attempting to reverse-calculate a password is called ____________________.

Correct Answer

verifed

verified

The set of organizational guidelines that dictates certain behavior within the organization is called ____________________.

Correct Answer

verifed

verified

Duplication of software-based intellectual property is more commonly known as software ____________________.

Correct Answer

verifed

verified

Showing 21 - 40 of 63

Related Exams

Show Answer