Exam 11: Managing Information Security
Exam 1: Information Systems Management in the Global Economy50 Questions
Exam 2: The Top Is Job50 Questions
Exam 3: Strategic Uses of Information Technology50 Questions
Exam 4: Strategic Information Systems Planning50 Questions
Exam 5: Designing Corporate It Architecture50 Questions
Exam 6: Managing Telecommunications50 Questions
Exam 7: Managing Corporate Information Resources50 Questions
Exam 8: Managing Partnership-Based It Operations50 Questions
Exam 9: Technology for Developing Effective Systems50 Questions
Exam 10: Management Issues in System Development50 Questions
Exam 11: Managing Information Security50 Questions
Exam 12: Supporting Information-Centric Decision Making50 Questions
Exam 13: Supporting It-Enabled Collaboration50 Questions
Exam 14: Supporting Knowledge Work50 Questions
Exam 15: The Opportunities and Challenges Ahead50 Questions
Select questions type
List five fundamental pillars that make up all security countermeasures and techniques.
Free
(Essay)
4.8/5
(39)
Correct Answer:
1. Authentication. Verifying the authenticity of users
2. Identification. Identifying users to grant them appropriate access
3. Privacy. Protecting information from being seen
4. Integrity. Keeping information in its original form
5. Nonrepudiation. Preventing parties from denying actions they have taken
Which of the following strategies involves creating a culture for enforcing IT security?
Free
(Multiple Choice)
4.7/5
(47)
Correct Answer:
B
Virtual Private Networks are hardware or software that controls access between networks.
(True/False)
4.9/5
(43)
Describe the management/business issues around both business continuity and IT disaster recovery.
(Essay)
4.8/5
(37)
For digital signatures to work, a trusted third party must issue the keys to individuals and firms.
(True/False)
4.8/5
(37)
Hacker tools are becoming increasingly sophisticated and easier to use allowing hackers to outsmart the countermeasures used by companies to protect themselves.
(True/False)
4.9/5
(37)
Authentication is a means of providing proof of data transmission or receipt so that the occurrence of a transaction cannot later be refused.
(True/False)
4.9/5
(38)
Vein-viewing technology can be used to replace signatures, keys, and passwords.
(True/False)
4.8/5
(42)
A common profile of an insider criminal is a poor performance review.
(True/False)
4.8/5
(32)
Describe three steps required for an organization to develop and information-centric security strategy.
(Essay)
4.7/5
(34)
All business executives need to understand threats and countermeasures and continually fund security work to protect their businesses.
(True/False)
4.8/5
(35)
Tunneling creates a temporary connection between to remote computer which blocks access to anyone trying to intercept messages sent over that link.
(True/False)
4.8/5
(39)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)