isys 363 quiz 4 part 2

isys 363 quiz 4 part 2 - 1 Marks: 1 You have been hired as...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Marks: 1 You have been hired as a security consultant for a legal firm. Which of the following constitutes the greatest threat, in terms of security, to the firm? Choose one answer. a. Wireless network b. Employees c. Authentication procedures d. Lack of data encryption Correct Marks for this submission: 1/1. Question 2 Marks: 1 In this technique, network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver: Choose one answer. a. stateful inspection b. intrusion detection system c. application proxy filtering d. packet filtering Correct Marks for this submission: 1/1. Question 3 Marks: 1 The Sarbanes-Oxley Act: Choose one answer. a. requires financial institutions to ensure the security of customer data.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
b. specifies best practices in information systems security and control. c. imposes responsibility on companies and management to safeguard the accuracy of financial information. d. outlines medical security and privacy rules. Correct Marks for this submission: 1/1. Question 4 Marks: 1 The HIPAA act of 1996: Choose one answer. a. requires financial institutions to ensure the security of customer data. b. specifies best practices in information systems security and control. c. imposes responsibility on companies and management to safeguard the accuracy of financial information. d. outlines medical security and privacy rules. Correct Marks for this submission: 1/1. Question 5 Marks: 1 In this method of encryption, a single encryption key is sent to the receiver so both sender and receiver share the same key. Choose one answer. a. SSL b. Symmetric key encryption c. Public key encryption
Background image of page 2
d. Private key encryption Correct Marks for this submission: 1/1. Question 6 Marks: 1 Electronic evidence on computer storage media that is not visible to the average user is called: Choose one answer. a. defragmented data. b. ambient data. c. forensic data. d. recovery data. Correct Marks for this submission: 1/1. Question 7
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/08/2011 for the course ISYS 363 taught by Professor Bmak during the Spring '08 term at S.F. State.

Page1 / 11

isys 363 quiz 4 part 2 - 1 Marks: 1 You have been hired as...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online