Exam 10: Information Systems Security
Exam 1: The Importance of Mis100 Questions
Exam 2: Collaboration Information Systems99 Questions
Exam 3: Strategy and Information Systems100 Questions
Exam 4: Hardware, Software, and Mobile Systems100 Questions
Exam 5: Database Processing104 Questions
Exam 6: The Cloud100 Questions
Exam 7: Processes, Organizations, and Information Systems100 Questions
Exam 8: Social Media Information Systems101 Questions
Exam 9: Business Intelligence Systems98 Questions
Exam 10: Information Systems Security102 Questions
Exam 11: Information Systems Management106 Questions
Exam 12: Information Systems Development105 Questions
Select questions type
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
(Multiple Choice)
4.8/5
(34)
Which of the following is a critical security function that should be addressed by the senior management of an organization?
(Multiple Choice)
4.8/5
(31)
Users of smart cards are required to enter a ________ to be authenticated.
(Multiple Choice)
4.8/5
(41)
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
(Multiple Choice)
4.8/5
(40)
A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________.
(Multiple Choice)
5.0/5
(26)
________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments.
(Multiple Choice)
4.7/5
(43)
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
(Multiple Choice)
5.0/5
(38)
Discuss some human safeguards for employees that can ensure the security of information systems.
(Essay)
4.8/5
(25)
________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system.
(Multiple Choice)
4.9/5
(31)
PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, attempts to fix the damage by retrieving information from backed up data. George is involved in the process of ________.
(Multiple Choice)
4.8/5
(39)
Describe the difference between a perimeter firewall and an internal firewall?
(Essay)
4.9/5
(40)
A computer crime is committed if an employee inadvertently installs an old database on top of the current one.
(True/False)
4.8/5
(33)
Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________.
(Multiple Choice)
5.0/5
(40)
Which of the following statements is True about data administration?
(Multiple Choice)
4.9/5
(42)
Showing 41 - 60 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)