Exam 12: Managing Information Security and Privacy
Exam 1: Information Systems and You113 Questions
Exam 2: Business Processes and Decision Making118 Questions
Exam 3: Application Extension-Introduction to Business Process Modeling With Microsoft Visio48 Questions
Exam 4: Productivity, Innovation, and Strategy118 Questions
Exam 5: Application Extension-Introduction to Microsoft Excel 201344 Questions
Exam 6: Hardware and Software147 Questions
Exam 7: Database and Content Management114 Questions
Exam 8: Extension-Using Microsoft Access 201349 Questions
Exam 9: Extension-Database Design87 Questions
Exam 10: Networks and Collaboration121 Questions
Exam 11: Competitive Advantage and Business Processes121 Questions
Exam 12: Decision Making and Business Intelligence139 Questions
Exam 13: E-commerce, Social Networking, and Web 20110 Questions
Exam 14: Acquiring Information Systems Through Projects112 Questions
Exam 15: Application Extension-Introduction to Microsoft Project42 Questions
Exam 16: Structure, Governance, and Ethics105 Questions
Exam 12: Managing Information Security and Privacy113 Questions
Select questions type
The sources of security problems are human error, malicious activity, and ________.
(Short Answer)
4.9/5
(36)
What are the three general sources of IS security threats? Which one is the most dangerous? Which one is the easiest to plan for?
(Essay)
4.9/5
(35)
Organizations should store at least some of the ________ of the database contents off the premises, possibly in a remote location.
(Multiple Choice)
4.8/5
(37)
The existence of ________ user accounts is a serious security threat.
(Multiple Choice)
4.7/5
(30)
Despite warnings, users have a tendency to write their passwords on sticky notes next to the computer.
(True/False)
4.8/5
(38)
After installing anti-virus and antispyware, what is the best way to avoid malware?
(Multiple Choice)
4.9/5
(39)
Firewalls produce ________ of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access.
(Multiple Choice)
4.9/5
(33)
An organization's security ________ has three components: senior management involvement, safeguards, and an incident response.
(Short Answer)
4.7/5
(43)
To protect against lost or sabotaged encryption keys, a trusted party should keep a copy of the key.
(True/False)
4.8/5
(37)
A(n) ________ must be entered when using a smart card in order to provide authentication.
(Short Answer)
4.9/5
(39)
Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party called a(n)
(Multiple Choice)
4.9/5
(45)
A retinal scan would be considered a biometric authentication technique.
(True/False)
5.0/5
(33)
Unauthorized data disclosure can occur by simple human ________ when someone inadvertently releases data in violation of a policy.
(Short Answer)
4.9/5
(43)
What is the idea of a single sign-on for multiple systems? What are the benefits and negatives associated with single sign-on?
(Essay)
4.8/5
(40)
Sometimes, just opening a webpage can install ________ on your computer.
(Short Answer)
4.7/5
(40)
A hacker can launch a denial-of-service attack against a web server by ________ it with millions of bogus service requests.
(Multiple Choice)
4.8/5
(37)
According to PIPEDA, every organization needs to identify anyone in the organization who is responsible for ________ personal information.
(Multiple Choice)
4.9/5
(36)
________ considerations should be part of the hiring process.
(Multiple Choice)
5.0/5
(32)
Biometric authentication has been around for some time, and because of weaknesses is not likely to see much usage in the future.
(True/False)
4.8/5
(33)
Showing 41 - 60 of 113
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)