INFO 360 – Chapter 8
A. Mobile devices appear vulnerable to rogue apps.
B. Mobile devices have less stringent passwords and locks.
C. Mobile devices are easily stolen and often contain corporate data.
D. Dictating what kind of data an app can access inside its sandbox domain.
E. Data leakage is caused by use of cloud storage services with mobile devices.
A. Unauthorized data disclosure
B. Denial of service
C. Unauthorized data modification
D. Faulty service
E. Forgotten passwords
A. Identifying acceptable security goals
B. Controlling what non organizational activities employees can do
C. Weighing what risks the organization is willing to accept for each asset
D. Ranking priorities of information risks
E. Identifying the mechanisms for achieving these goals
A. Intrusion detection systems
B. Managed security service providers
C. Unified threat management
D. Deep packet inspection
E. Antivirus software
A. Is a mix of letters and numbers
B. Contains no word in any language
C. Has upper- and lowercase characters
D. Contains special characters
E. Has six or fewer characters
A. presenting the information to a court of law.
B. protecting the computer assets from fraudulent access.
C. finding significant information in a large volume of electronic data.
D. recovering data from computers while preserving evidential integrity.
E. securely storing and handling recovered electronic data.
A. LinkedIn did not install security patches and bug fixes.
B. LinkedIn had minimal password protection via encryption.
C. LinkedIn did not sufficiently protect its website from hackers.
D. LinkedIn had not salted its user passwords.
E. LinkedIn did not store hashed passwords on separate secure Web servers.
A. dissemination and enforcement
B. positon definiton
C. incidence response plan
E. hiring and screening
E. Trojan horse
A. Establishing the security policy and managing risk
B. Managing security programs on a real-time basis
C. Safeguarding computer hardware and software
D. Developing IS security software
E. Monitoring potential malicious activity continuously
A. Knowingly transmitting a program, program code, or command that intentionally causes damages to a protected computer
B. Accessing a computer system without authority
C. Breaching the confidentiality of protected computerized data
D. Using e-mail for threats or harassment
E. Knowingly accessing a protected computer to commit fraud
A. malware protection
E. identification and authorization
A. The sender encrypts the message with the recipient’s public key.
B. The private key is kept secret.
C. The public key is shared using a directory.
D. On receiving the message, the recipient uses the public key to decrypt it.
E. It uses two keys that are mathematically related.
B. data rights and responsibilities
D. backup and recovery
C. Procedural mistakes
A. Unauthorized copying of software or copyrighted intellectual property
B. Launching schemes to defraud
C. Accessing a computer system without authority
D. Intentionally attempting to intercept electronic communication
E. Using e-mail for threats or harassment
A. The identification of critical business processes
B. When and how the plan is to be updated and refined
C. Action plans for handling mission-critical functions if systems go down
D. The technical issues involved in keeping systems up and running
E. How the company can restore business operations after a disaster strikes
A. Not using the same password for all your accounts
B. Buying only from online vendors that use https in their transactions
C. Using long and complex passwords
D. Never sending valuable data such as credit number in email or IM
E. Backing up your browsing history, temporary files, and cookies
A. They help a user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data.
B. The recipient decodes the encrypted message by using the CA’s public key.
C. They authenticate that the public key belongs to the designated owner.
D. The CA verifies a digital certificate user’s identity online.
E. They contain the owner’s identification and a copy of the owner’s public key.
Need essay sample on "INFO 360 – Chapter 8"? We will write a custom essay sample specifically for you for only .90/page