Exam 12: Information Systems Development
Exam 1: The Importance of MIS120 Questions
Exam 2: Business Processes, Information Systems, and Information123 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage119 Questions
Exam 4: Hardware and Software124 Questions
Exam 5: Database Processing123 Questions
Exam 6: The Cloud120 Questions
Exam 7: Organizations and Information Systems116 Questions
Exam 8: Social Media Information Systems120 Questions
Exam 9: Business Intelligence Systems122 Questions
Exam 10: Information Systems Security118 Questions
Exam 11: Information Systems Management105 Questions
Exam 12: Information Systems Development123 Questions
Exam 13: The International Dimension31 Questions
Select questions type
Biometric authentication uses physical characteristics such as retinal scans to authenticate users.
(True/False)
4.9/5
(37)
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
(Multiple Choice)
4.9/5
(34)
In the context of information security, safeguards increase work efficiency by making common tasks easier.
(True/False)
4.9/5
(38)
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
(Multiple Choice)
4.9/5
(41)
An Advanced Persistent Threat (APT) is a sophisticated computer hack that is perpetrated by large, well-funded organizations such as governments.
(True/False)
4.9/5
(37)
Which of the following is classified as a technical safeguard?
(Multiple Choice)
5.0/5
(41)
In asymmetric encryption, each site has a ________ for encoding messages.
(Multiple Choice)
4.7/5
(43)
________ are false targets for computer criminals to attack.
(Multiple Choice)
4.9/5
(28)
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers.
(True/False)
5.0/5
(32)
________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
(Multiple Choice)
4.7/5
(39)
Symmetric encryption is simpler and much faster than asymmetric encryption.
(True/False)
4.7/5
(45)
________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.
(Multiple Choice)
4.9/5
(33)
Employee termination is a potential security threat for an organization.
(True/False)
4.9/5
(38)
Specific security policies should not depend on whether the organization is governmental or nongovernmental or whether it is publicly held or private.
(True/False)
4.7/5
(30)
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
(True/False)
4.8/5
(37)
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
(Multiple Choice)
4.9/5
(36)
A computer crime is committed if an employee inadvertently installs an old database on top of the current one.
(True/False)
4.9/5
(35)
Showing 81 - 100 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)