Chapter 4 Backup and recovery procedures are recommended

subject Type Homework Help
subject Pages 5
subject Words 766
subject Authors Brad Prince, R. Kelly Rainer

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Package Title: Homework Questions
Course Title: IS 5e
Chapter Number: 4
Question Type: Multiple Choice
Question Type: True/False
1) Backup and recovery procedures are recommended only to safeguard against hardware/software failures.
2) An information system’s ____ is the likelihood that the system or resource will be compromised by a ____
that will result in its ____ to further attacks.
a) Vulnerability, threat, exposure
b) Vulnerability, security, threat
c) Threat, vulnerability, liability
d) Threat, vulnerability, exposure
3) Which of the following factors that make information resources more vulnerable to attack can be most easily
remedied?
page-pf2
a) Interconnected/dependent business environments
b) Larger and cheaper storage
c) Organized cyber crime
d) Decrease skill level of hackers
e) Lack of management control
f) None all factors are exogenous
4) Which of the following can be classified as unintentional threats to information systems caused by human
errors?
a) Selecting a weak password
b) Revealing your password
c) Leaking company data to others
d) Both (a) and (b)
e) None of the above
5) An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate
employee into providing confidential company information is known as:
a) Trespass.
b) Social engineering.
c) Identity theft.
d) Information extortion.
page-pf3
6) Making and distributing information goods to which you do not own the ___ is referred to as ____.
a) copyright, piracy
b) intellectual property, piracy
c) copyright, appropriation
d) intellectual property, theft
7)
Whereas phishing attacks are ____ , denial of service attacks are ____.
a) remote attacks requiring user action, remote attacks requiring no user action
b) remote attacks requiring no user action, attacks by a programmer developing a system
c) remote attacks requiring no user action, remote attacks requiring user action
d) Distributed remote attacks requiring user action, attacks by a programmer developing a system
8) Computer programs like CAPTCHA are used to counter
a) Hackers using key loggers.
b) Malware.
c) Hackers using screen scrappers.
d) Websites leaving cookies on the local machine.
page-pf4
9) Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.
a) transference, limitation
b) transference, acceptance
c) limitation, acceptance
d) limitation, transference
10) Implementing controls to prevent threats from occurring and developing a recovery plan should the threats
occur are two broad functions of
a) Risk mitigation.
b) Risk acknowledgement.
c) Risk acceptance.
d) All of the above.
11) Access controls consist of ____, which confirms user identity, and ____, which determines user access
levels.
page-pf5
a) access, privileges
b) authorization, privileges
c) authentication, authorization
d) passwords, privileges
12) _____ can be used to create strong passwords that are easy to remember.
a) Mnemonics
b) Passphrases
c) Birthdates
d) Numbers

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.