Exam 10: Information Systems Security
Exam 1: The Importance of Mis98 Questions
Exam 2: Business Processes, Information Systems, and Information101 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage108 Questions
Exam 4: Hardware and Software101 Questions
Exam 5: Database Processing100 Questions
Exam 6: The Cloud85 Questions
Exam 7: Processes, Organizations, and Information Systems95 Questions
Exam 8: Social Media Information Systems113 Questions
Exam 9: Business Intelligence Systems104 Questions
Exam 10: Information Systems Security118 Questions
Exam 11: Information Systems Management90 Questions
Exam 12: Information Systems Development108 Questions
Exam 13: Collaboration Information Systems for Decision Making, Problem Solving, and Project Management58 Questions
Exam 14: Collaborative Information Systems for Student Projects67 Questions
Exam 15: Mobile Systems65 Questions
Exam 16: Introduction to Microsoft Excel 201657 Questions
Exam 17: Database Design51 Questions
Exam 18: Using Microsoft Access 201656 Questions
Exam 19: Using Excel and Access Together55 Questions
Exam 20: Network and Cloud Technology72 Questions
Exam 21: Enterprise Resource Planning Erp Systems60 Questions
Exam 22: Supply Chain Management50 Questions
Exam 23: Enterprise Social Networks and Knowledge Management50 Questions
Exam 24: Database Marketing45 Questions
Exam 25: Reporting Systems and Olap50 Questions
Exam 26: Artificial Intelligence and Automation45 Questions
Exam 27: Data Breaches65 Questions
Exam 28: International Mis56 Questions
Exam 29: Systems Development Project Management60 Questions
Exam 30: Agile Development55 Questions
Exam 31: Business Process Management56 Questions
Select questions type
In terms of password management, when an account is created, users should ________.
(Multiple Choice)
4.8/5
(31)
Most secure communications over the Internet use a protocol called ________.
(Multiple Choice)
4.8/5
(35)
Describe how a computer may show signs of spyware and/or adware symptoms.
(Essay)
4.9/5
(39)
Explain the concept of denial of service (DOS) in information management.
(Essay)
4.7/5
(40)
What is one of the drawbacks of removing and disabling cookies?
(Multiple Choice)
4.9/5
(36)
Smart cards are convenient to use because they do not require a personal identification number for authentication.
(True/False)
4.9/5
(39)
Wardrivers are those who engage in phishing to obtain unauthorized access to data.
(True/False)
5.0/5
(42)
A user name authenticates a user, and a password identifies that user.
(True/False)
4.7/5
(38)
Which of the following is the most expensive consequence of computer crime?
(Multiple Choice)
5.0/5
(41)
Pretexting occurs when someone deceives by pretending to be someone else.
(True/False)
4.7/5
(42)
A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.
(Multiple Choice)
4.9/5
(41)
Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.
(True/False)
4.7/5
(43)
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.
(Multiple Choice)
5.0/5
(40)
A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.
(Multiple Choice)
4.9/5
(43)
Which of the following is a task for the system user during the recovery system procedure?
(Multiple Choice)
4.9/5
(37)
Which of the following statements is TRUE of the financial losses due to computer crimes?
(Multiple Choice)
4.8/5
(35)
Explain the types of events that result in faulty service, a type of security loss.
(Essay)
4.9/5
(44)
________ is a technique for intercepting computer communications.
(Multiple Choice)
4.7/5
(44)
Showing 41 - 60 of 118
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)