Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today202 Questions
Exam 2: How Businesses Use Information Systems195 Questions
Exam 3: Information Systems, organizations, and Strategy193 Questions
Exam 4: Social, ethical, and Legal Issues in Information Systems198 Questions
Exam 5: It Infrastructure and Emerging Technologies199 Questions
Exam 6: Databases and Information Management198 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology204 Questions
Exam 8: Securing Information Systems202 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers197 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods171 Questions
Exam 11: Managing Knowledge189 Questions
Exam 12: Enhancing Decision Making174 Questions
Exam 13: Developing Information Systems200 Questions
Exam 14: Project Management, business Value, and Managing Change177 Questions
Exam 15: Managing Global Systems196 Questions
Select questions type
A ________ is a device about the size of a credit card that contains a chip formatted with access permission and other data.
(Short Answer)
4.8/5
(41)
Betty downloaded a peer to peer file sharing program.She is worried that it might have come with spyware attached to it.She had a friend who had a spyware problem where all of her keystrokes were stolen which included her bank passwords.Betty's friend was a victim of ________.
(Multiple Choice)
4.8/5
(39)
Statements ranking information risks and identifying security goals are included in a(n)
(Multiple Choice)
4.9/5
(33)
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
(Essay)
4.9/5
(34)
________ planning focuses on how the company can restore business operations after a disaster strikes.
(Multiple Choice)
4.8/5
(36)
The range of Wi-Fi networks can be extended up to two miles by using external antennae.
(True/False)
4.8/5
(42)
________ also may involve redirecting a Web link to an address different from the intended one,with the site masquerading as the intended destination.
(Short Answer)
4.8/5
(38)
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
(True/False)
4.8/5
(43)
Authentication refers to the ability to know that a person is who he or she claims to be.
(True/False)
4.8/5
(36)
Large public networks,such as the Internet,are more ________ than internal networks because they are virtually open to anyone.
(Short Answer)
4.8/5
(35)
Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers outside the organization's control.
(True/False)
4.8/5
(35)
________ are independent computer programs that copy themselves from one computer to other computers over a network.
(Short Answer)
4.9/5
(34)
How do software vendors correct flaws in their software after it has been distributed?
(Multiple Choice)
4.7/5
(40)
An independent computer program that copies itself from one computer to another over a network is called a
(Multiple Choice)
4.8/5
(41)
A ________ is a physical device,similar to an identification card,that is designed to prove the identity of a single user.
(Short Answer)
4.8/5
(34)
The Conficker worm uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely.
(True/False)
4.8/5
(34)
The Sasser.ftp worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book.Infected 15 to 29 percent of all business PCs,causing $300 million to $600 million in damage.
(True/False)
4.8/5
(41)
Your company notices that many of its employees peruse face during their day at work.Should your business be concerned? Why?
(Essay)
4.9/5
(27)
Showing 161 - 180 of 202
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)