Exam 12: Information Systems Development
Exam 1: The Importance of MIS120 Questions
Exam 2: Business Processes, Information Systems, and Information123 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage119 Questions
Exam 4: Hardware and Software124 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Organizations and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems122 Questions
Exam 10: Information Systems Security118 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
If a backup of the database contents is made, the database is completely protected.
(True/False)
4.7/5
(33)
With ________, the sender and receiver transmit a message using different keys.
(Multiple Choice)
4.9/5
(36)
Which of the following statements is true about human safeguards for employees?
(Multiple Choice)
4.7/5
(33)
A ________ is a type of virus that propagates using the Internet or other computer networks.
(Multiple Choice)
4.8/5
(42)
The single most important computer security safeguard that can be implemented is to create and use passwords that comprise of names.
(True/False)
4.9/5
(42)
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
(Multiple Choice)
4.8/5
(36)
The security of online transactions has increased with the use of https.
(True/False)
4.8/5
(43)
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system.
(True/False)
4.9/5
(32)
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
(Multiple Choice)
5.0/5
(30)
The process of hardening a Web site is a ________ safeguard.
(Multiple Choice)
4.8/5
(38)
Most spyware programs are benign in that they do not perform malicious acts or steal data.
(True/False)
4.8/5
(38)
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
(Multiple Choice)
4.9/5
(38)
Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.
(Multiple Choice)
4.9/5
(39)
Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption.
(True/False)
4.7/5
(32)
Drive-by sniffers monitor and intercept wireless traffic at will.
(True/False)
4.8/5
(45)
Showing 41 - 60 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)