Exam 5: Protecting Information Resources
Exam 1: Information Systems in Business122 Questions
Exam 2: Computers and Their Business Applications117 Questions
Exam 3: Data and Business Intelligence127 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues124 Questions
Exam 5: Protecting Information Resources122 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime121 Questions
Exam 7: A Connected World118 Questions
Exam 8: E-Commerce128 Questions
Exam 9: Global Information Systems124 Questions
Exam 10: Building Successful Information Systems106 Questions
Exam 11: Enterprise Systems135 Questions
Exam 12: Supporting Decisions and Processes110 Questions
Exam 13: Artificial Intelligence and Automation125 Questions
Exam 14: Emerging Trends, Technologies, and Applications112 Questions
Select questions type
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
(Multiple Choice)
4.8/5
(39)
In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.
(True/False)
4.8/5
(43)
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
(True/False)
4.8/5
(33)
One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management.
(True/False)
4.8/5
(41)
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
(Multiple Choice)
4.8/5
(31)
A ________ is rented from a third party and usually contains telecommunication equipment.
(Multiple Choice)
4.8/5
(29)
A(n)_____ network is often used so that remote users have a secure connection to an organization's network.
(Multiple Choice)
4.9/5
(33)
In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.
(Multiple Choice)
4.8/5
(33)
Before establishing a security program, organizations should __________.
(Multiple Choice)
4.7/5
(29)
When developing a comprehensive security plan, which of the following steps is not recommended?
(Multiple Choice)
4.9/5
(31)
When planning a comprehensive security system, the first step is designing _____ , which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.
(Multiple Choice)
4.7/5
(28)
John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.
(Multiple Choice)
4.8/5
(41)
In the context of data encryption, briefly describe asymmetric encryption.
(Essay)
4.9/5
(30)
A _____ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.
(Multiple Choice)
4.7/5
(40)
Explain the use of callback modems as a nonbiometric security measure.
(Essay)
4.9/5
(20)
Showing 21 - 40 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)