Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Business Driven Technology Study Set 4
Quiz 25: Valuing and Storing Organizational Informationdatabases
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Question 2
True/False
Organizations address security risks through two lines of defense. The first is people and the second is technology.
Question 3
True/False
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Question 4
True/False
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
Question 5
True/False
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Question 6
True/False
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
Question 7
True/False
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
Question 8
True/False
Information security policies detail how an organization will implement the information security plan.
Question 9
True/False
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Question 10
True/False
Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.
Question 11
True/False
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Question 12
True/False
A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.