Exam 4: Information Security
Exam 1: Introduction to Information Systems130 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems165 Questions
Exam 3: Ethics and Privacy122 Questions
Exam 4: Information Security169 Questions
Exam 5: Data and Knowledge Management144 Questions
Exam 6: Telecommunications and Networking192 Questions
Exam 7: E-Business and E-Commerce132 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce159 Questions
Exam 9: Social Computing110 Questions
Exam 10: Information Systems Within the Organization108 Questions
Exam 11: CRM and SCM170 Questions
Exam 12: Business Analytics5 Questions
Exam 13: Acquiring Information Systems and Applications148 Questions
Exam 14: Hardware105 Questions
Exam 15: Software61 Questions
Exam 16: Cloud Computing100 Questions
Exam 17: Artificial Intelligence46 Questions
Select questions type
You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake.
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
B
If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
Judith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of _____________.
(Multiple Choice)
4.8/5
(33)
Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors.
(True/False)
4.8/5
(40)
Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks.
(True/False)
4.9/5
(39)
The external audit of information systems is frequently a part of the overall external auditing performed by a CPA firm.
(True/False)
4.7/5
(30)
You are a computer programmer who feels short-changed by your organization. To get back at them, you would most likely use a Trojan horse, back door, or logic bomb.
(True/False)
4.9/5
(41)
___ refers to all the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
(Short Answer)
4.8/5
(25)
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
(Multiple Choice)
4.8/5
(32)
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
(Multiple Choice)
4.7/5
(35)
The 2017 Equifax data breach occurred because attackers _______.
(Multiple Choice)
4.8/5
(36)
___ are small amounts of information that websites store on your computer, temporarily or more or less permanently.
(Short Answer)
4.9/5
(30)
Auditing _________ the computer means auditors check inputs, outputs, and processing.
(Multiple Choice)
5.0/5
(28)
_________ causes pop-up advertisements to appear on your screen.
(Multiple Choice)
4.9/5
(30)
The goal of whaling is to trick a(n) _______ into revealing personal or corporate data.
(Multiple Choice)
4.7/5
(34)
XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?
(Multiple Choice)
4.7/5
(38)
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 169
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)