Exam 12: Managing Information Security and Privacy
Exam 1: Information Systems and You87 Questions
Exam 2: Business Process Management and Decision Making91 Questions
Exam 3: Productivity, innovation and Strategy90 Questions
Exam 4: Hardware and Software112 Questions
Exam 5: Database and Content Management90 Questions
Exam 6: Networks and Collaboration97 Questions
Exam 7: Competitive Advantage and Business Proces96 Questions
Exam 8: Decision Making and Business Intelligence103 Questions
Exam 9: E-Commerce, social Networking and Web 2.085 Questions
Exam 10: Acquiring Information Systems Through Projects82 Questions
Exam 11: Structure, governance and Ethics80 Questions
Exam 12: Managing Information Security and Privacy88 Questions
Exam 13: Business Process Modeling: Techniques, Rules, and Applications38 Questions
Exam 14: Excel Basics: Understanding Spreadsheets, Cells, and Formulas39 Questions
Exam 15: Database Design and Entity Relationships65 Questions
Exam 16: Creating and Utilizing Forms, Queries, and Reports in MS Access39 Questions
Exam 17: Understanding MS Project: Features and Functions32 Questions
Select questions type
Technical safeguards involve the hardware and software components of an information system.
(True/False)
4.8/5
(39)
If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with
(Multiple Choice)
4.7/5
(34)
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
(True/False)
4.8/5
(40)
Spoofing is a technique for intercepting computer communications.
(True/False)
4.7/5
(33)
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
(True/False)
4.8/5
(41)
Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.
(Multiple Choice)
4.8/5
(42)
Organizations should protect sensitive data by storing it in ________ form.
(Multiple Choice)
4.9/5
(37)
What are the three general sources of IS security threats? Which one is the most dangerous? Which one is the easiest to plan for?
(Essay)
4.9/5
(34)
What is the idea of a single sign-on for multiple systems? What are the benefits and negatives associated with single-sign on?
(Essay)
5.0/5
(24)
Help desks have not been the source of many security problems in the past.
(True/False)
4.9/5
(27)
Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.
(Multiple Choice)
4.8/5
(35)
________,which are the patterns that exist in malware code,should be downloaded and updated frequently.
(Multiple Choice)
4.8/5
(37)
A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.
(Multiple Choice)
4.7/5
(35)
A(n)________ card has a microchip on it that is loaded with identifying data.
(Multiple Choice)
4.9/5
(31)
Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.
(Multiple Choice)
4.9/5
(32)
Showing 41 - 60 of 88
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)