Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology89 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
An acceptable use policy defines the acceptable level of access to information assets for different users.
Free
(True/False)
4.9/5
(43)
Correct Answer:
False
________ is malware that logs and transmits everything a user types.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
Computer forensics tasks include all of the following except
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.8/5
(30)
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
(True/False)
4.9/5
(37)
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
(Multiple Choice)
4.9/5
(41)
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
(Multiple Choice)
4.8/5
(40)
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
(True/False)
4.8/5
(38)
How can a firm's security policies contribute and relate to the six main business objectives?
Give examples.
(Essay)
4.8/5
(34)
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as
(Multiple Choice)
4.7/5
(42)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.9/5
(40)
Which of the following is not an example of a computer used as an instrument of crime?
(Multiple Choice)
4.9/5
(39)
For 100-percent availability, online transaction processing requires
(Multiple Choice)
4.8/5
(40)
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
(Multiple Choice)
4.9/5
(35)
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called
(Multiple Choice)
4.9/5
(40)
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)