Exam 10: Information Systems Security
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems122 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware, Software, and Mobile Systems129 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Processes, Organizations, and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems118 Questions
Exam 10: Information Systems Security123 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development122 Questions
Select questions type
Drive-by sniffers monitor and intercept wireless traffic on secured wireless networks.
(True/False)
4.8/5
(32)
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
(Multiple Choice)
4.9/5
(36)
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
(Multiple Choice)
4.8/5
(36)
A ________ examines each part of a message and determines whether to let that part pass.
(Multiple Choice)
5.0/5
(33)
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
(Multiple Choice)
5.0/5
(35)
Secure Sockets Layer (SSL) is a protocol that is restricted to asymmetric encryption.
(True/False)
4.8/5
(38)
Short passwords with no special characters can make strong passwords.
(True/False)
4.9/5
(38)
One of the personal security safeguards is to use https at trusted, reputable vendors.
(True/False)
4.8/5
(38)
The process of hardening a Web site is a ________ safeguard.
(Multiple Choice)
4.7/5
(42)
________ are small files that enables a browser to access Web sites without having to sign in every time.
(Multiple Choice)
4.8/5
(32)
Which of the following is used for biometric authentication?
(Multiple Choice)
4.8/5
(42)
Which of the following statements is True about losses due to computer security threats?
(Multiple Choice)
4.7/5
(40)
In the context of malware protection, the program code that causes the unwanted actions is called the ________.
(Multiple Choice)
4.8/5
(47)
Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.
(Multiple Choice)
4.7/5
(38)
Showing 21 - 40 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)