Exam 12: Information Security Management
Exam 1: Is in the Life of Business Professionals113 Questions
Exam 2: Business Processes, Information, and Information Systems119 Questions
Exam 2: Extensions S: Using Collaboration Information Systems49 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage116 Questions
Exam 4: Hardware and Software143 Questions
Exam 5: Database Processing115 Questions
Exam 5: Extensions A: Introduction to Microsoft Excel87 Questions
Exam 5: Extensions B: Introduction to Microsoft Excel49 Questions
Exam 6: Data Communications123 Questions
Exam 7: Business Process Management124 Questions
Exam 8: E-Commerce and Web 2.0143 Questions
Exam 9: Business Intelligence and Information Systems for Decision Making104 Questions
Exam 10: Information Systems Development121 Questions
Exam 10: Extensions A: How the Internet Works42 Questions
Exam 11: Information Systems Management113 Questions
Exam 12: Information Security Management115 Questions
Select questions type
One aspect of security programs is how an organization establishes____________ that provide checks and balances for the people in charge of sensitive data and applications.
Free
(Short Answer)
4.9/5
(32)
Correct Answer:
controls
When an employee notices a virus on his machine,the___________plan should specify what to do.
Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
E
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
Fingerprints and facial features are used to provide authentication for_________security devices.
(Short Answer)
4.8/5
(42)
___________occurs when a person gains unauthorized access to a computer system.
(Short Answer)
4.8/5
(39)
The best safeguard against a natural disaster is to have a safe location.
(True/False)
4.9/5
(32)
Since most organizations are protected by a(n)___________spread via e -mail.
(Multiple Choice)
4.8/5
(30)
Unauthorized data disclosure is a major type of security problem.How do the different sources of threats exploit this problem?
(Essay)
4.7/5
(32)
A company should clearly define the security__________for each position.
(Multiple Choice)
4.8/5
(34)
When an incident is reported____________is (are) of the essence
(Multiple Choice)
4.7/5
(35)
Because Microsoft employs hundreds of programmers from around the world in writing its operating systems,they must have careful procedures for___________what code gets in.
(Multiple Choice)
4.9/5
(39)
The purpose of a(n)____________is to protect databases and other organizational data.
(Multiple Choice)
4.9/5
(32)
What is the idea of a single sign -on for multiple systems? What are the benefits and negatives associated with single -sign on?
(Essay)
4.9/5
(38)
A retinal scan would be considered a biometric authentication technique.
(True/False)
4.7/5
(40)
Users should be given (the)_________ _to perform their jobs
(Multiple Choice)
4.7/5
(38)
___________safeguards involve the people and procedure components of information systems.
(Multiple Choice)
4.8/5
(27)
A(n)___________is someone who pretends to be a legitimate company and sends e -mail requesting confidential data.
(Multiple Choice)
4.7/5
(36)
Showing 1 - 20 of 115
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)