Exam 12: Information Security Management
Exam 1: Mis and You162 Questions
Exam 2: Information Systems for Collaboration161 Questions
Exam 3: Is for Competitive Advantage162 Questions
Exam 4: Hardware and Software160 Questions
Exam 5: Database Processing161 Questions
Exam 6: Data Communications160 Questions
Exam 7: Information Systems Within the Organization159 Questions
Exam 8: E-Commerce and Supply Chain Systems160 Questions
Exam 9: Business Intelligence Systems159 Questions
Exam 10: Systems Development161 Questions
Exam 11: Information Systems Management161 Questions
Exam 12: Information Security Management157 Questions
Exam 13: How the Internet Works64 Questions
Select questions type
__________safeguards involve the people and procedure components of information systems.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
Phishing is usually initiated via a(n) __________.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
If you are a manager, even if they don't tell you about it, one of your overarching concerns is about __________management.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
risk
The Privacy Act of 1974 gives individuals the right to access health data.
(True/False)
4.9/5
(34)
What is risk management? How should management make these tough decisions?
(Essay)
4.9/5
(31)
A _ ___________ is any action, device, procedure, technique, or other measure that reduces a system's security to a threat.
(Short Answer)
4.8/5
(36)
Unauthorized data disclosure can occur by simple human __________when someone inadvertently releases data in violation of a policy.
(Short Answer)
4.8/5
(31)
A hacker can launch a denial of service attack against a Web server by__________ it with millions of bogus service requests.
(Multiple Choice)
4.8/5
(33)
__________is a technique for intercepting computer communications.
(Short Answer)
4.8/5
(40)
A __________ is an operation that spoofs legitimate companies in an attempt to illegally capture credit card or bank account numbers.
(Short Answer)
4.9/5
(40)
You should never send sensitive data over the Internet unless you see https:// in the browser's address bar.
(True/False)
4.8/5
(31)
What is a denial of service security problem? How does this result from actions by the various sources of security threats?
(Essay)
4.9/5
(34)
Pre- texting is the same as__________ in the world of malicious computer activities.
(Short Answer)
4.8/5
(40)
Because encryption keys can be lost or destroyed, a copy of the key should stored with a trusted third party called a(n):
(Multiple Choice)
4.8/5
(43)
By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or Web server resulting in a __________.
(Short Answer)
4.7/5
(29)
Technical safeguards involve the hardware and software components of an information system.
(True/False)
4.9/5
(37)
Hardened Web sites use special versions of the operating systems and functions that are not required by the application.
(True/False)
4.8/5
(33)
Showing 1 - 20 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)