Exam 12: Information Security Management
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware and Software120 Questions
Exam 5: Database Processing120 Questions
Exam 6: Data Communication and the Cloud130 Questions
Exam 7: Processes, Organizations, and Information Systems120 Questions
Exam 8: Social Media Information Systems121 Questions
Exam 9: Business Intelligence Systems120 Questions
Exam 10: Development Processes120 Questions
Exam 11: Information Systems Management103 Questions
Exam 12: Information Security Management123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
________ are false targets for computer criminals to attack.
(Multiple Choice)
4.9/5
(44)
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
(Multiple Choice)
4.7/5
(45)
Natural disasters present the largest risk for infrastructure loss.
(True/False)
4.8/5
(32)
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ________.
(Multiple Choice)
4.8/5
(32)
A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.
(Multiple Choice)
5.0/5
(38)
________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
(Multiple Choice)
4.9/5
(42)
In asymmetric encryption, each site has a ________ for encoding messages.
(Multiple Choice)
4.9/5
(25)
Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.
(Multiple Choice)
4.9/5
(33)
A ________ examines each part of a message and determines whether to let that part pass.
(Multiple Choice)
4.9/5
(34)
If the incident-response plan is not well prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
(True/False)
4.7/5
(37)
Technical safeguards involve the hardware and software components of an information system.
(True/False)
4.8/5
(37)
Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.
(True/False)
4.9/5
(45)
If a backup of the database contents is made, the database is protected.
(True/False)
4.9/5
(40)
________ are viruses that masquerade as useful programs or files.
(Multiple Choice)
4.8/5
(33)
Define encryption and explain symmetric and asymmetric encryption for computer systems.
(Essay)
4.9/5
(47)
Showing 41 - 60 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)