Exam 9: Information Security
Exam 1: Introduction to Information Systems78 Questions
Exam 2: Information Systems for Competitive Advantage80 Questions
Exam 3: Using Information Technology to Engage in Electronic Commerce78 Questions
Exam 4: System Users and Developers80 Questions
Exam 5: Computing and Communications Resources80 Questions
Exam 6: Database Management Systems79 Questions
Exam 7: Systems Development80 Questions
Exam 8: Information in Action80 Questions
Exam 9: Information Security80 Questions
Exam 10: Ethical Implications of Information Technology80 Questions
Exam 11: Decision Support Systems79 Questions
Exam 12: Everyday Technology Skills20 Questions
Exam 13: Web/HTML Project Using Microsoft FrontPage20 Questions
Exam 14: Web/HTML Project Using Notepad20 Questions
Exam 15: Web/HTML Student Survey20 Questions
Exam 16: Web/HTML Book Purchase20 Questions
Exam 17: Spreadsheet Basics20 Questions
Exam 18: Spreadsheets with Data Capture - Vacation Choice20 Questions
Exam 19: Spreadsheets with Data Capture - Movie Ticket Purchase20 Questions
Exam 20: Database Forms and Reports20 Questions
Exam 21: Database Queries - Customer Database20 Questions
Exam 22: Database Queries - Inventory Database20 Questions
Exam 23: Reports Based on Queries20 Questions
Select questions type
Firms can enter into a reciprocal agreement with other users of the same type of equipment so that each firm can provide backup to the other in the event of a catastrophe.
(True/False)
4.8/5
(34)
With a Trojan horse, the distribution is accomplished by users who distribute it as a utility.
(True/False)
4.9/5
(41)
The ___________specifies those measures that ensure the safety of employees when disaster strikes.
(Essay)
4.7/5
(39)
Access controls are those built into systems by the system developers during the system development life cycle.
(True/False)
4.8/5
(38)
The ___________is a recommended level of security that in normal circumstances should offer reasonable protection against unauthorized intrusion.
(Essay)
4.8/5
(41)
The final step in writing a risk analysis report should be to document what has been done to mitigate the risk.
(True/False)
4.7/5
(36)
The title of the person who has typically been responsible for the firm's information systems security is the:
(Multiple Choice)
4.8/5
(43)
When the firm seeks to protect its data and information from disclosure to unauthorized persons, the information security objective is:
(Multiple Choice)
4.7/5
(29)
A virus is a complete program or segment of code that can invade a system and perform functions not intended by the system owners.
(True/False)
4.7/5
(34)
User authorization makes use of access control files that specify the levels of access available to each user.
(True/False)
4.7/5
(36)
The newer title for the information security officer that reports to the CEO and manages an information assurance unit is:
(Multiple Choice)
4.8/5
(34)
A _____________ is a complete computing facility that is made available by a supplier to its customers for use in the event of emergencies.
(Essay)
4.8/5
(32)
The Certified Information Security Manager designation is the newest professional certification for security.
(True/False)
4.8/5
(32)
The access control whereby users verify their right to access by providing something they have or something they are is referred to as:
(Multiple Choice)
4.9/5
(24)
An ___________ is a set of four numbers that uniquely identify each computer connected to the Internet.
(Essay)
5.0/5
(35)
Information security management is the activity of keeping the firm and its information resources functional after a catastrophe.
(True/False)
4.8/5
(31)
When backup service includes a hot site, only the building facilities but not the computing resources are provided.
(True/False)
4.8/5
(26)
Authorization makes use of___________ that specify the levels of access available to each user.
(Essay)
4.8/5
(26)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)