Exam 12: Information Systems Development
Exam 1: The Importance of MIS120 Questions
Exam 2: Business Processes, Information Systems, and Information123 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage119 Questions
Exam 4: Hardware and Software124 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Organizations and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems122 Questions
Exam 10: Information Systems Security118 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
(Multiple Choice)
4.7/5
(34)
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
(True/False)
4.8/5
(33)
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
(Multiple Choice)
4.9/5
(30)
________ is the term used to denote viruses, worms, and Trojan horses.
(Multiple Choice)
4.9/5
(37)
________ present the largest risk for an organization's infrastructure loss.
(Multiple Choice)
4.8/5
(34)
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
(Multiple Choice)
4.9/5
(43)
Define encryption and explain symmetric and asymmetric encryption for computer systems.
(Essay)
4.8/5
(34)
Which of the following usually happens in a malicious denial-of-service attack?
(Multiple Choice)
4.9/5
(40)
________ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time.
(Multiple Choice)
4.9/5
(36)
Data safeguards are measures used to protect computer hardware from external threat.
(True/False)
4.9/5
(36)
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
(Multiple Choice)
4.7/5
(32)
Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.
(Multiple Choice)
4.9/5
(40)
Which of the following statements is true about losses due to computer security threats?
(Multiple Choice)
4.9/5
(42)
Which of the following statements is true of data administration?
(Multiple Choice)
4.9/5
(45)
Which of the following is considered a threat caused by human error?
(Multiple Choice)
5.0/5
(33)
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
(True/False)
4.8/5
(42)
Showing 61 - 80 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)