Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure: Hardware and Software90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Improving Decision Making and Managing Knowledge90 Questions
Exam 12: Building Information Systems and Managing Projects90 Questions
Select questions type
________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
(Multiple Choice)
5.0/5
(38)
All of the following are types of information systems general controls except:
(Multiple Choice)
4.8/5
(41)
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
(Multiple Choice)
4.9/5
(44)
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
(Multiple Choice)
4.7/5
(43)
Specific security challenges that threaten corporate servers in a client/server environment include:
(Multiple Choice)
4.9/5
(38)
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
(Multiple Choice)
4.9/5
(44)
Redirecting a Web link to a different address is a form of:
(Multiple Choice)
4.9/5
(33)
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
(Essay)
4.9/5
(37)
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
(True/False)
4.8/5
(40)
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
(Multiple Choice)
4.7/5
(41)
Large amounts of data stored in electronic form are ________ than the same data in manual form.
(Multiple Choice)
4.9/5
(32)
Why is software quality important to security? What specific steps can an organization take to ensure software quality?
(Essay)
4.9/5
(43)
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:
(Multiple Choice)
4.7/5
(39)
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
(True/False)
4.8/5
(39)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)