Exam 9: Information Security
Exam 1: Introduction to Information Systems78 Questions
Exam 2: Information Systems for Competitive Advantage80 Questions
Exam 3: Using Information Technology to Engage in Electronic Commerce78 Questions
Exam 4: System Users and Developers80 Questions
Exam 5: Computing and Communications Resources80 Questions
Exam 6: Database Management Systems79 Questions
Exam 7: Systems Development80 Questions
Exam 8: Information in Action80 Questions
Exam 9: Information Security80 Questions
Exam 10: Ethical Implications of Information Technology80 Questions
Exam 11: Decision Support Systems79 Questions
Exam 12: Everyday Technology Skills20 Questions
Exam 13: Web/HTML Project Using Microsoft FrontPage20 Questions
Exam 14: Web/HTML Project Using Notepad20 Questions
Exam 15: Web/HTML Student Survey20 Questions
Exam 16: Web/HTML Book Purchase20 Questions
Exam 17: Spreadsheet Basics20 Questions
Exam 18: Spreadsheets with Data Capture - Vacation Choice20 Questions
Exam 19: Spreadsheets with Data Capture - Movie Ticket Purchase20 Questions
Exam 20: Database Forms and Reports20 Questions
Exam 21: Database Queries - Customer Database20 Questions
Exam 22: Database Queries - Inventory Database20 Questions
Exam 23: Reports Based on Queries20 Questions
Select questions type
Which of the following is not part of the U.S. Government Internet Crime Legislation?
(Multiple Choice)
4.9/5
(44)
The International Standard Organization is a nonprofit organization dedicated to assist computer users with making their systems more secure.
(True/False)
4.9/5
(34)
When the impact severity can cause significant damage and cost but the firm will survive, it is classified as:
(Multiple Choice)
4.8/5
(32)
The contingency plan specifies those measures that ensure the safety of employees when disaster strikes.
(True/False)
4.8/5
(33)
Which one of the following is not a general practice that retailers should follow as identified by Visa?
(Multiple Choice)
4.8/5
(36)
A packet- filtering firewall is the most effective type of firewall.
(True/False)
4.8/5
(36)
In which phase of an information security policy would the project team consult with all interested and affected parties to determine the requirements of the new policy?
(Multiple Choice)
5.0/5
(35)
The organization that aims its certification at intrusion detection, firewall and perimeter protection, and operating system security is the:
(Multiple Choice)
4.8/5
(41)
Insider threat prediction tools have been developed that consider such characteristics as the person 's position in the firm, access to sensitive data, ability to alter hardware components, the types of applications used, the files owned, and the usage of certain network protocols.
(True/False)
4.9/5
(41)
A control is a mechanism that is implemented to either protect the firm from risks or to minimize the impact of the risks on the firm should they occur.
(True/False)
4.9/5
(38)
Identification and authentication make use of___________ , or descriptions of authorized users.
(Essay)
4.9/5
(36)
When the database and software library are made available to persons not entitled to have access, the type of information security risk is:
(Multiple Choice)
4.9/5
(27)
Which of the following is not a step in information security management?
(Multiple Choice)
5.0/5
(30)
The backup plan where hardware, software, and data are duplicated so that when one set is inoperable, the backup set can continue the processing is called redundancy.
(True/False)
4.8/5
(38)
Which type of control is built into systems by the system developers during the system development life cycle?
(Multiple Choice)
4.8/5
(27)
Cryptography is the use of coding by means of mathematical processes.
(True/False)
4.9/5
(37)
Showing 41 - 60 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)