Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today202 Questions
Exam 2: How Businesses Use Information Systems195 Questions
Exam 3: Information Systems, organizations, and Strategy193 Questions
Exam 4: Social, ethical, and Legal Issues in Information Systems198 Questions
Exam 5: It Infrastructure and Emerging Technologies199 Questions
Exam 6: Databases and Information Management198 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology204 Questions
Exam 8: Securing Information Systems202 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers197 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods171 Questions
Exam 11: Managing Knowledge189 Questions
Exam 12: Enhancing Decision Making174 Questions
Exam 13: Developing Information Systems200 Questions
Exam 14: Project Management, business Value, and Managing Change177 Questions
Exam 15: Managing Global Systems196 Questions
Select questions type
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(True/False)
4.8/5
(35)
A ________ is a software program that appears to be benign but then does something other than expected.
(Short Answer)
4.9/5
(30)
A ________ is an individual who intends to gain unauthorized access to a computer system.
(Short Answer)
4.9/5
(29)
________ is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
(Multiple Choice)
4.9/5
(40)
________ encryption uses two keys: one shared (or public)and one private.
(Short Answer)
4.8/5
(31)
An acceptable use policy defines the acceptable level of access to information assets for different users.
(True/False)
4.8/5
(25)
The Melissa worm affected millions of computers worldwide,disrupting British Airways flight check-ins,operations of British Coast Guard stations,Hong Kong hospitals,Taiwan post office branches,and Australia's Westpac Bank.
(True/False)
4.9/5
(40)
The ________ worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book.Infected 15 to 29 percent of all business PCs,causing $300 million to $600 million in damage.
(Short Answer)
4.9/5
(36)
Smartphones share the same ________ weaknesses as other Internet devices and are vulnerable to malicious software and penetration from outsiders.
(Short Answer)
4.7/5
(40)
Fault-tolerant computers contain redundant hardware,software,and power supply components.
(True/False)
4.9/5
(30)
John clicks into his online banking Web site.He is already to type in his password when he notices that something is just not right.Upon further examination he notices that it is not the actual bank site but one that looks almost identical.John was almost a victim of ________.
(Multiple Choice)
4.9/5
(34)
________ devises plans for the restoration of computing and communications services after they have been disrupted.
(Short Answer)
4.9/5
(45)
A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
(Short Answer)
4.8/5
(42)
Software errors are no threat to information systems,that could cause untold losses in productivity.
(True/False)
4.8/5
(37)
You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.
(Essay)
4.9/5
(33)
Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control.
(Multiple Choice)
4.8/5
(35)
High-availability computing is also referred to as fault tolerance.
(True/False)
4.8/5
(40)
Showing 61 - 80 of 202
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)