Filters
Question type

Study Flashcards

Using the qualitative approach to risk assessment,each loss exposure is computed as the product of the cost of an individual loss times the likelihood of its occurrence.

Correct Answer

verifed

verified

The objective of the first phase of the security system life cycle is to design risk control measures such as various security measures and contingency plans.

Correct Answer

verifed

verified

Direct observation includes shoulder surfing and dumpster diving.

Correct Answer

verifed

verified

The primary way to prevent active threats concerning fraud and sabotage is to implement successive layers of access controls.The second step behind the layered approach to access control is to


A) prevent unauthorized access to both data and program files.
B) physically separate unauthorized individuals from computer resources.
C) classify all data and equipment according to their importance and vulnerability.
D) keep unauthorized users from using the system.

Correct Answer

verifed

verified

Information security management system is part of the larger ________ risk management process.

Correct Answer

verifed

verified

A serious business problem today is the theft of data.

Correct Answer

verifed

verified

Business continuity planning and disaster recovery,in general,mean the same thing.

Correct Answer

verifed

verified

Passive threats include information systems fraud and computer sabotage.

Correct Answer

verifed

verified

Malware can be hidden in email,downloaded software,disk or Web browser.

Correct Answer

verifed

verified

Fault tolerance can be applied at any of three levels: input,processing,or output.

Correct Answer

verifed

verified

The three objectives of information security are ________,________,and ________.

Correct Answer

verifed

verified

confidenti...

View Answer

________ ________ involves manipulating victims in order to trick them into divulging privileged information.

Correct Answer

verifed

verified

One Internet security problem arises from configuration problems in the area of configuring permissions for directories.This is an example of


A) an operating system vulnerability.
B) a Web server vulnerability.
C) a private network vulnerability.
D) server program vulnerability.

Correct Answer

verifed

verified

Discuss the information security system life cycle.

Correct Answer

verifed

verified


Because the electronic security system...

View Answer

The ________ makes it a federal crime,with a mandatory prison sentence,to pretext any kind of information that relates to a relationship between a consumer and a financial institution.


A) Computer Fraud and Abuse Act of 1986
B) Telephone Records and Privacy Protection Act of 2006
C) Gramm-Leach-Bliley Act
D) Health Insurance Portability and Accountability Act

Correct Answer

verifed

verified

In computer environments,________ control is especially important as there is often a tendency to either overspend or spend on the wrong things.

Correct Answer

verifed

verified

The method used in most cases of computer fraud is


A) program alteration.
B) input manipulation.
C) data theft.
D) sabotage.

Correct Answer

verifed

verified

In most organizations,accounting,computing,and data processing are all organized under the controller.

Correct Answer

verifed

verified

Using cloud-based services and data storage is referred to as cloud computing.

Correct Answer

verifed

verified

Social engineering is a form of manipulation of people in order to trick them into divulging privileged information.

Correct Answer

verifed

verified

Showing 81 - 100 of 172

Related Exams

Show Answer