Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today202 Questions
Exam 2: How Businesses Use Information Systems195 Questions
Exam 3: Information Systems, organizations, and Strategy193 Questions
Exam 4: Social, ethical, and Legal Issues in Information Systems198 Questions
Exam 5: It Infrastructure and Emerging Technologies199 Questions
Exam 6: Databases and Information Management198 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology204 Questions
Exam 8: Securing Information Systems202 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers197 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods171 Questions
Exam 11: Managing Knowledge189 Questions
Exam 12: Enhancing Decision Making174 Questions
Exam 13: Developing Information Systems200 Questions
Exam 14: Project Management, business Value, and Managing Change177 Questions
Exam 15: Managing Global Systems196 Questions
Select questions type
Robert knows that he got an independent program off of his network on his computer.It deleted all of his spreadsheet files on his hard drive.Robert feels that this problem may have resulted from him opening up an attachment file on his e-mail.Robert is the victim of ________.
(Multiple Choice)
4.8/5
(38)
Computer crime is defined as "any criminal activity involving the copy of,use of,removal of,interference with,access to,manipulation of computer systems,and/or their related functions,data or programs."
(True/False)
4.9/5
(25)
Specific security challenges that threaten the communications lines in a client/server environment include
(Multiple Choice)
4.7/5
(42)
Many Wi-Fi networks can be penetrated easily by intruders using ________ programs to obtain an address to access the resources of a network without authorization.
(Multiple Choice)
5.0/5
(38)
A hacker is an individual who intends to gain unauthorized access to a computer system.
(True/False)
4.9/5
(31)
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
(True/False)
4.9/5
(37)
Businesses must protect not only their own information assets but also those of ________.
(Multiple Choice)
4.9/5
(39)
Electronic evidence on computer storage media that is not visible to the average user is called ________ data.
(Multiple Choice)
4.8/5
(40)
On the whole,________ controls apply to all computerized applications and consist of a combination of hardware,software,and manual procedures that create an overall control environment.
(Short Answer)
4.8/5
(32)
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
(True/False)
4.8/5
(31)
The term ________ is typically used to denote a hacker with criminal intent.
(Short Answer)
4.8/5
(36)
One increasingly popular tactic is a form of spoofing called phishing.
(True/False)
4.7/5
(36)
Computer forensics is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
(True/False)
4.8/5
(38)
Output controls check data for accuracy and completeness when they enter the system.
(True/False)
4.8/5
(36)
Businesses must protect only their own information assets but not those of customers,employees,and business partners.
(True/False)
4.9/5
(40)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.9/5
(36)
Showing 121 - 140 of 202
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)