Filters
Question type

Study Flashcards

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a program or device that can monitor data travelling over a network?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Surprisingly, the biggest issue surrounding information security is not a technical issue, but a people issue.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________ privacy policy details the extent to which email messages may be read by others.

Correct Answer

verifed

verified

email

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is a backup?


A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

To facilitate information privacy, many countries have abolished legislation to protect the collection and sharing of personal information.

A) True
B) False

Correct Answer

verifed

verified

An organization should implement information security lines of defence through technology first and people second.

A) True
B) False

Correct Answer

verifed

verified

False

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster?


A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

The information security plan details ho...

View Answer

Which of the following is not a part of the email privacy policy stipulations?


A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?


A) Hourly
B) Daily
C) Weekly
D) Monthly

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

False

Surprisingly, the biggest issue surrounding information security is not a technical issue, but a(n) _____________ issue.

Correct Answer

verifed

verified

If an organization were to have only one policy, which one would it want?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Explain how HIPAA protects individual's health records?

Correct Answer

verifed

verified

HIPAA is the Health Insurance Portabilit...

View Answer

How individuals behave toward each other, how they handle information, computer technologies, and information systems, are largely influenced by people's ________________.

Correct Answer

verifed

verified

Describe authentication and the most secure type of authentication.

Correct Answer

verifed

verified

Authentication is a method for confirmin...

View Answer

Showing 1 - 20 of 200

Related Exams

Show Answer