Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 5
Quiz 8: Controls for Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Essay
Describe what information security process the term hardening refers to.
Question 62
Multiple Choice
ShareIt is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(n)
Question 63
Multiple Choice
A border router
Question 64
Multiple Choice
In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.
Question 65
Multiple Choice
All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(n)
Question 66
Multiple Choice
The most effective method for protecting an organization from social engineering attacks is providing
Question 67
Multiple Choice
A demilitarized zone
Question 68
Multiple Choice
The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.
Question 69
Essay
Describe four requirements of effective passwords .
Question 70
Essay
Identify six physical access controls.
Question 71
Multiple Choice
A major financial institution hired a renowned security firm to attempt to compromise its computer network.A few days later,the security firm reported that it had successfully entered the financial institution's computer system without being detected.The security firm presented an analysis of the vulnerabilities that had been found to the financial institution.This is an example of a
Question 72
Multiple Choice
New employees of Baker Technologies are assigned user names and appropriate permissions.Each of them were given a company's issued laptop that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)
Question 73
Essay
Identify three ways users can be authenticated and give an example of each.
Question 74
Multiple Choice
Residents in Berryhill received an e-mail stating that there is an armed robber on the loose.The e-mail claimed to be from the Berryhill police department,but it wasn't.Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library.The police were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras later help the police to reveal the identity of the individual responsible for the hoax.
Question 75
Multiple Choice
New employees of Baker Technologies are assigned user names and appropriate permissions.Their credentials are then entered into the company's information system's access control matrix.This is an example of a(n)