Exam 12: Information Security Management
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware and Software120 Questions
Exam 5: Database Processing120 Questions
Exam 6: Data Communication and the Cloud130 Questions
Exam 7: Processes, Organizations, and Information Systems120 Questions
Exam 8: Social Media Information Systems121 Questions
Exam 9: Business Intelligence Systems120 Questions
Exam 10: Development Processes120 Questions
Exam 11: Information Systems Management103 Questions
Exam 12: Information Security Management123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
An intrusion detection system (IDS)is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
(True/False)
4.9/5
(41)
________ present the largest risk for an organization's infrastructure loss.
(Multiple Choice)
4.7/5
(47)
Business requirements do not necessitate opening information systems to nonemployee personnel-temporary personnel, vendors or partner personnel.
(True/False)
4.7/5
(35)
________ involve the people and procedure components of information systems.
(Multiple Choice)
4.8/5
(40)
Cookies enable an individual to access Web sites without having to sign in every time.
(True/False)
4.9/5
(44)
Companies should require vendors and partners to perform appropriate screening and security training.
(True/False)
4.9/5
(40)
A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
(Multiple Choice)
4.9/5
(40)
________ is similar to spyware but it watches user activity and produces pop-ups.
(Multiple Choice)
4.9/5
(30)
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
(True/False)
4.8/5
(34)
In a study conducted by Verizon, in a year only about a hundred thousand people become victims of computer crimes.
(True/False)
4.8/5
(40)
In a study conducted by Verizon, in 2011, the four most frequent computer crimes involved criminal activity against servers.
(True/False)
5.0/5
(37)
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
(True/False)
4.8/5
(34)
Which of the following usually happens in a malicious denial-of-service attack?
(Multiple Choice)
4.7/5
(37)
A safety procedure that allows a trusted party to have a copy of the encryption key is called key ________.
(Multiple Choice)
4.8/5
(35)
Showing 61 - 80 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)