Exam 12: Managing Information Security and Privacy
Exam 1: Information Systems and You87 Questions
Exam 2: Business Process Management and Decision Making91 Questions
Exam 3: Productivity, innovation and Strategy90 Questions
Exam 4: Hardware and Software112 Questions
Exam 5: Database and Content Management90 Questions
Exam 6: Networks and Collaboration97 Questions
Exam 7: Competitive Advantage and Business Proces96 Questions
Exam 8: Decision Making and Business Intelligence103 Questions
Exam 9: E-Commerce, social Networking and Web 2.085 Questions
Exam 10: Acquiring Information Systems Through Projects82 Questions
Exam 11: Structure, governance and Ethics80 Questions
Exam 12: Managing Information Security and Privacy88 Questions
Exam 13: Business Process Modeling: Techniques, Rules, and Applications38 Questions
Exam 14: Excel Basics: Understanding Spreadsheets, Cells, and Formulas39 Questions
Exam 15: Database Design and Entity Relationships65 Questions
Exam 16: Creating and Utilizing Forms, Queries, and Reports in MS Access39 Questions
Exam 17: Understanding MS Project: Features and Functions32 Questions
Select questions type
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
D
Some of the biggest security threats are from ________ employees.
Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
B
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
PIPEDA gives individuals the right to know why an organization is ________ their personal information.
(Multiple Choice)
4.8/5
(32)
People who intentionally gain unauthorized access to computer systems are called hackers.
(True/False)
4.7/5
(38)
The purpose of a(n)________ is to protect databases and other organizational data.
(Multiple Choice)
4.8/5
(42)
A retinal scan would be considered a biometric authentication technique.
(True/False)
4.9/5
(33)
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
(True/False)
4.8/5
(32)
A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.
(Multiple Choice)
4.8/5
(29)
A company should clearly define the security ________ for each position.
(Multiple Choice)
4.9/5
(32)
Denial of service always occurs because of malicious attacks on the system.
(True/False)
4.9/5
(32)
Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.
(True/False)
4.7/5
(40)
Bloggers have not yet had much of an impact on the main stream media.
(True/False)
4.9/5
(34)
________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.
(Multiple Choice)
4.8/5
(40)
User accounts should be given (the)________ to perform their jobs
(Multiple Choice)
4.9/5
(29)
Most anti-malware programs check e-mail attachments for malware code.
(True/False)
4.8/5
(42)
Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.
(Multiple Choice)
4.7/5
(38)
What is a denial of service security problem? How does this result from actions by the various sources of security threats?
(Essay)
4.8/5
(36)
Showing 1 - 20 of 88
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)