Exam 12: Information Security Management
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware and Software120 Questions
Exam 5: Database Processing120 Questions
Exam 6: Data Communication and the Cloud130 Questions
Exam 7: Processes, Organizations, and Information Systems120 Questions
Exam 8: Social Media Information Systems121 Questions
Exam 9: Business Intelligence Systems120 Questions
Exam 10: Development Processes120 Questions
Exam 11: Information Systems Management103 Questions
Exam 12: Information Security Management123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
With ________ encryption, the sender and receiver transmit a message using the same key.
(Multiple Choice)
4.8/5
(43)
In symmetric encryption, two different keys are used to encode and decode a message.
(True/False)
4.9/5
(40)
Phishing is a technique for intercepting computer communications.
(True/False)
4.9/5
(42)
Which of the following statements is true of biometric identification?
(Multiple Choice)
4.8/5
(41)
________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.
(Multiple Choice)
4.7/5
(37)
Most spyware programs are benign in that they do not perform malicious acts or steal data.
(True/False)
4.8/5
(32)
Which of the following is considered a threat caused by human error?
(Multiple Choice)
5.0/5
(39)
An SQL ________ occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
(Multiple Choice)
4.9/5
(31)
Symmetric encryption is simpler and much faster than asymmetric encryption.
(True/False)
4.9/5
(38)
Brute force requires only 2 days to crack a password having a mixture of upper and lowercase letters, numbers, and special characters.
(True/False)
4.9/5
(39)
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
(True/False)
4.9/5
(41)
A ________ is a type of virus that propagates using the Internet or other computer networks.
(Multiple Choice)
4.7/5
(29)
Which of the following is used for biometric authentication?
(Multiple Choice)
4.8/5
(37)
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
(Multiple Choice)
4.9/5
(36)
You are transferring funds online through the Web site of a reputed bank.Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
(Multiple Choice)
4.7/5
(38)
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.This is done to achieve ________.
(Multiple Choice)
4.8/5
(29)
Which of the following systems procedures is specifically the responsibility of operations personnel?
(Multiple Choice)
4.9/5
(45)
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
(True/False)
4.9/5
(41)
Showing 81 - 100 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)