Exam 10: Information Systems Security
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems122 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware, Software, and Mobile Systems129 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Processes, Organizations, and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems118 Questions
Exam 10: Information Systems Security123 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development122 Questions
Select questions type
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL) protocol?
(Multiple Choice)
4.9/5
(41)
Most spyware programs are benign in that they do not perform malicious acts or steal data.
(True/False)
4.8/5
(37)
An Advanced Persistent Threat (APT) is a sophisticated computer hack that is perpetrated by large, well-funded organizations such as governments.
(True/False)
4.8/5
(46)
Users of smart cards are required to enter a ________ to be authenticated.
(Multiple Choice)
4.8/5
(47)
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
(True/False)
4.8/5
(41)
________ are viruses that masquerade as useful programs or files.
(Multiple Choice)
4.8/5
(42)
Which of the following statements is True about biometric identification?
(Multiple Choice)
4.9/5
(30)
Which of the following usually happens in a malicious denial-of-service attack?
(Multiple Choice)
5.0/5
(35)
Which of the following is a critical security function that should be addressed by the senior management of an organization?
(Multiple Choice)
4.8/5
(35)
Technical safeguards involve the hardware and software components of an information system.
(True/False)
4.8/5
(48)
________ is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior.
(Multiple Choice)
4.9/5
(28)
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
(Multiple Choice)
4.7/5
(29)
Natural disasters present the largest risk for infrastructure loss.
(True/False)
4.9/5
(39)
Which of the following statements is True about data administration?
(Multiple Choice)
4.7/5
(39)
A denial-of-service attack is launched when a hacker floods a Web server with millions of bogus service requests.
(True/False)
4.8/5
(34)
Malware is a broad category of software that includes viruses, spyware and adware.
(True/False)
4.8/5
(32)
Which of the following is most likely to be a result of hacking?
(Multiple Choice)
4.8/5
(40)
Showing 61 - 80 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)