Exam 12: Information Security Management
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware and Software120 Questions
Exam 5: Database Processing120 Questions
Exam 6: Data Communication and the Cloud130 Questions
Exam 7: Processes, Organizations, and Information Systems120 Questions
Exam 8: Social Media Information Systems121 Questions
Exam 9: Business Intelligence Systems120 Questions
Exam 10: Development Processes120 Questions
Exam 11: Information Systems Management103 Questions
Exam 12: Information Security Management123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
________ occurs when someone deceives by pretending to be someone else.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
D
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
Free
(True/False)
4.9/5
(46)
Correct Answer:
False
Which of the following is most likely to be the result of hacking?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
Biometric authentication uses characteristics such as retinal scans.
(True/False)
4.8/5
(28)
Secure Socket Layer (SSL)is a protocol that is restricted to asymmetric encryption.
(True/False)
4.8/5
(34)
Drive-by sniffers monitor and intercept wireless traffic at will.
(True/False)
4.8/5
(23)
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
(Multiple Choice)
4.8/5
(29)
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal and manipulate data, or other purposes.
(Multiple Choice)
4.8/5
(38)
________ is a staff function to the chief information officer.
(Multiple Choice)
4.9/5
(30)
The Privacy Act of 1974 provides protection to individuals regarding ________.
(Multiple Choice)
4.9/5
(37)
Even short passwords with no special characters can make strong passwords.
(True/False)
4.8/5
(33)
Which of the following statements about human safeguards for employees is true?
(Multiple Choice)
4.7/5
(37)
A new hire must seek out the employer's security policy if it is not discussed in new employee training.
(True/False)
4.8/5
(37)
Showing 1 - 20 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)