8 questions
Which of the following are reasons why systems are vulnerable t?
accessibility of network
theft of devices
disaster
high prices
Which of the following causes internet vulnerabilities?
Unencrypted VOIP
Faulty hardware
Open network
fix internet addresses
Eavesdroppers drive by buildings and try to detect S S I D and gain access to network and resources. This refers to
Rogue access points
War driving
Radio Frequency
Sniffing programs
Which of the following is typically associated with criminal intent?
programmer
cracker
coder
hacker
A security breach may cut into a firm’s market value
true
false
Name any three types of information systems controls
Name two types of plans that are needed to identify a firm's most critical systems?
Which of these are tools and technologies for sage guarding information systems
two-factor authentication
identity management software
Firewall
Antivirus software
Password systems