Exam 12: Managing Information Security and Privacy
Exam 1: Information Systems and You113 Questions
Exam 2: Business Processes and Decision Making118 Questions
Exam 3: Application Extension-Introduction to Business Process Modeling With Microsoft Visio48 Questions
Exam 4: Productivity, Innovation, and Strategy118 Questions
Exam 5: Application Extension-Introduction to Microsoft Excel 201344 Questions
Exam 6: Hardware and Software147 Questions
Exam 7: Database and Content Management114 Questions
Exam 8: Extension-Using Microsoft Access 201349 Questions
Exam 9: Extension-Database Design87 Questions
Exam 10: Networks and Collaboration121 Questions
Exam 11: Competitive Advantage and Business Processes121 Questions
Exam 12: Decision Making and Business Intelligence139 Questions
Exam 13: E-commerce, Social Networking, and Web 20110 Questions
Exam 14: Acquiring Information Systems Through Projects112 Questions
Exam 15: Application Extension-Introduction to Microsoft Project42 Questions
Exam 16: Structure, Governance, and Ethics105 Questions
Exam 12: Managing Information Security and Privacy113 Questions
Select questions type
Spoofing is a technique for intercepting computer communications.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
A(n) ________ card has a microchip on it that is loaded with identifying data.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
A
Backup and recovery, passwords, and encryption are human safeguards.
Free
(True/False)
4.7/5
(39)
Correct Answer:
False
Technical safeguards involve the hardware and software components of an information system.
(True/False)
4.7/5
(34)
User accounts should be given (the) ________ to perform their jobs.
(Multiple Choice)
4.9/5
(29)
Passwords have weaknesses because users often choose simple passwords, which ________ systems can easily guess.
(Multiple Choice)
4.8/5
(37)
If you ever receive notification that your password has been reset when you did not request a reset, immediately contact your IS department.
(True/False)
4.9/5
(32)
Since most organizations are protected by a(n) ________, it is not surprising that most viruses spread via email.
(Multiple Choice)
4.9/5
(25)
Some new operating systems offer a feature called ________, which remembers your data once you enter it the first time and authenticates you to other machines in the network.
(Short Answer)
4.8/5
(40)
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial-of-service attack.
(True/False)
4.8/5
(39)
By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or web server resulting in a(n) ________.
(Short Answer)
4.7/5
(39)
Hardened websites use special versions of the operating systems and functions that are not required by the application.
(True/False)
4.7/5
(27)
Because they kept giving out passwords to users who claimed to have forgotten them, ________ were a serious security risk in the organization.
(Multiple Choice)
4.8/5
(38)
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
(True/False)
4.7/5
(34)
In order to intercept communications on ________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections.
(Multiple Choice)
5.0/5
(35)
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.
(Multiple Choice)
4.8/5
(31)
A computer ________ is a program that infiltrates networks and generates so much artificial traffic that it virtually shuts down the network for legitimate traffic.
(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 113
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)