Exam 12: Information Security Management
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware and Software120 Questions
Exam 5: Database Processing120 Questions
Exam 6: Data Communication and the Cloud130 Questions
Exam 7: Processes, Organizations, and Information Systems120 Questions
Exam 8: Social Media Information Systems121 Questions
Exam 9: Business Intelligence Systems120 Questions
Exam 10: Development Processes120 Questions
Exam 11: Information Systems Management103 Questions
Exam 12: Information Security Management123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
Discuss some human safeguards for employees that can ensure the security of information systems.
(Essay)
4.8/5
(33)
Which of the following is a critical security function of senior management in an organization?
(Multiple Choice)
4.9/5
(31)
A Trojan horse is a virus that masquerades as a useful program or file.
(True/False)
4.8/5
(42)
It is easy and economical to hold public users of Web sites accountable for security violations.
(True/False)
4.8/5
(40)
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
(Multiple Choice)
4.9/5
(34)
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss.
(True/False)
4.9/5
(36)
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
(Multiple Choice)
4.8/5
(38)
________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.
(Multiple Choice)
4.9/5
(35)
A virus is a computer program that replicates itself.The program code that causes unwanted activity is called the ________.
(Multiple Choice)
4.8/5
(30)
Which of the following is true of the Secure Socket Layer (SSL)?
(Multiple Choice)
4.9/5
(40)
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
(Multiple Choice)
4.8/5
(40)
Data safeguards are measures used to protect computer hardware from external threat.
(True/False)
4.9/5
(45)
________ is the term used to denote viruses, worms and Trojan horses.
(Multiple Choice)
4.8/5
(43)
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
(True/False)
4.9/5
(35)
Employee termination is a potential security threat for an organization.
(True/False)
4.8/5
(38)
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
(Multiple Choice)
4.9/5
(42)
The existence of accounts that are no longer in use are not a security threat to an organization.
(True/False)
4.8/5
(44)
Security policies must not depend on whether the organization is governmental or nongovernmental,
or whether it is publically held or private.
(True/False)
4.8/5
(34)
Showing 21 - 40 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)