Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today202 Questions
Exam 2: How Businesses Use Information Systems195 Questions
Exam 3: Information Systems, organizations, and Strategy193 Questions
Exam 4: Social, ethical, and Legal Issues in Information Systems198 Questions
Exam 5: It Infrastructure and Emerging Technologies199 Questions
Exam 6: Databases and Information Management198 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology204 Questions
Exam 8: Securing Information Systems202 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers197 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods171 Questions
Exam 11: Managing Knowledge189 Questions
Exam 12: Enhancing Decision Making174 Questions
Exam 13: Developing Information Systems200 Questions
Exam 14: Project Management, business Value, and Managing Change177 Questions
Exam 15: Managing Global Systems196 Questions
Select questions type
A fixed Internet address creates a ________ target for hackers.
(Short Answer)
4.8/5
(41)
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
(Multiple Choice)
4.8/5
(36)
Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without ________.
(Short Answer)
4.8/5
(31)
Currently,the protocols used for secure information transfer over the Internet are
(Multiple Choice)
4.8/5
(36)
Disaster recovery planning devises plans for the restoration of computing and communications services before they have been disrupted.
(True/False)
4.8/5
(42)
________ govern the design,security,and use of computer programs and the security of data files throughout the organization's IT infrastructure.
(Multiple Choice)
4.9/5
(33)
Many firms are reluctant to spend heavily on security because it is not directly related to ________.
(Multiple Choice)
4.9/5
(41)
A ________ determines the level of risk to the firm if a specific activity or process is not properly controlled.
(Short Answer)
4.8/5
(34)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.9/5
(35)
Bob wants to use encryption tools in his firm but he is not sure if he should use public key or private key encryption.He really doesn't understand the differences between the two.Describe the two types of encryption for Bob.
(Essay)
4.8/5
(38)
Sally is the CEO of a chain of health clinics in Ontario.She is growing more and more concerned about the security of records in her company.She is wondering about the legal and regulatory requirements for electronic record management in Canada.What would you advise Sally about the legal and regulatory requirements for electronic record management in Canada?
(Essay)
4.7/5
(34)
A Trojan horse is a software program that appears threatening but is really benign.
(True/False)
4.9/5
(47)
A ________ is a rogue software program that attaches itself to other software programs or data files in order to be executed,usually without user knowledge or permission.
(Short Answer)
4.7/5
(31)
________ is tricking people into revealing their passwords or other information by pretending to be legitimate users or members of a company in need of information.
(Short Answer)
4.8/5
(43)
________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.
(Multiple Choice)
4.8/5
(40)
________ refers to policies,procedures,and technical measures used to prevent unauthorized access,alternation,theft,or physical damage to information systems.
(Multiple Choice)
4.8/5
(36)
Showing 141 - 160 of 202
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)