Exam 10: Information Systems Security
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems122 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware, Software, and Mobile Systems129 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Processes, Organizations, and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems118 Questions
Exam 10: Information Systems Security123 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development122 Questions
Select questions type
In asymmetric encryption, each site has a ________ for encoding messages.
(Multiple Choice)
4.7/5
(37)
The senior management of an organization must establish company-wide security policies.
(True/False)
4.9/5
(31)
Faulty service excludes problems that result due to incorrect data modification.
(True/False)
4.9/5
(44)
A computer crime is committed if an employee inadvertently installs an old database on top of the current one.
(True/False)
4.8/5
(39)
Phishing is a technique for intercepting computer communications.
(True/False)
4.9/5
(36)
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
(Multiple Choice)
4.9/5
(32)
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
(Multiple Choice)
4.9/5
(41)
In information security, which of the following is True about managing risk?
(Multiple Choice)
4.9/5
(44)
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
(True/False)
4.7/5
(37)
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
(Multiple Choice)
4.9/5
(38)
A Trojan horse is a virus that masquerades as a useful program or file.
(True/False)
4.8/5
(39)
________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access.
(Multiple Choice)
4.8/5
(41)
With ________, the sender and receiver transmit a message using different keys.
(Multiple Choice)
4.7/5
(35)
Discuss some human safeguards for employees that can ensure the security of information systems.
(Essay)
4.8/5
(25)
________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
(Multiple Choice)
4.9/5
(39)
The specifics of a security policy should not depend on whether the organization is governmental or nongovernmental, or whether it is publicly held or private.
(True/False)
4.8/5
(32)
Business requirements do not necessitate opening information systems to nonemployee personnel, such as temporary personnel, vendors, or partner personnel.
(True/False)
4.8/5
(29)
Showing 81 - 100 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)