Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: IT Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
In a walkthrough, hackers are able to bypass security controls of a system with little opposition.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
A
Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used?
(Essay)
4.8/5
(36)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.9/5
(35)
A(n) ________ examines the firm's overall security environment as well as the controls governing individual information systems.
(Short Answer)
4.9/5
(42)
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
(True/False)
4.9/5
(41)
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
(Essay)
4.9/5
(41)
For 100% availability, online transaction processing requires
(Multiple Choice)
4.9/5
(32)
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
(True/False)
4.9/5
(39)
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.8/5
(41)
Mobile devices are not targeted as extensively by malware as traditional computers.
(True/False)
4.9/5
(36)
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
(Short Answer)
4.7/5
(36)
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.
(Short Answer)
4.9/5
(33)
A drive-by download is a technique used by hackers to enable accessing files on a wireless network.
(True/False)
5.0/5
(36)
All of the following are methods of ensuring software quality except for
(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)