Exam 10: Information Systems Security
Exam 1: The Importance of MIS120 Questions
Exam 2: Collaboration Information Systems122 Questions
Exam 3: Strategy and Information Systems119 Questions
Exam 4: Hardware, Software, and Mobile Systems129 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Processes, Organizations, and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems118 Questions
Exam 10: Information Systems Security123 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development122 Questions
Select questions type
The single most important computer security safeguard that can be implemented is the creation and use of passwords that are comprised of names.
(True/False)
4.8/5
(39)
________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system.
(Multiple Choice)
4.8/5
(42)
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
(True/False)
4.8/5
(31)
The losses due to human error are minimal, and hence, organizations tend to ignore these losses.
(True/False)
4.8/5
(46)
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.
(Multiple Choice)
4.8/5
(36)
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
(True/False)
4.8/5
(37)
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
(Multiple Choice)
4.8/5
(30)
Biometric authentication uses physical characteristics such as retinal scans to authenticate users.
(True/False)
5.0/5
(40)
Which of the following statements is True about human safeguards for employees?
(Multiple Choice)
4.8/5
(35)
It is easy and economical to hold public users of Web sites accountable for security violations.
(True/False)
4.8/5
(37)
Which of the following is classified as a technical safeguard?
(Multiple Choice)
4.8/5
(40)
Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.
(Multiple Choice)
4.9/5
(46)
The existence of accounts that are no longer in use is not a security threat to an organization.
(True/False)
4.9/5
(44)
Hardening a site means to take extraordinary measures to reduce a system's vulnerability.
(True/False)
4.8/5
(38)
Showing 101 - 120 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)