Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure: Hardware and Software90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Improving Decision Making and Managing Knowledge90 Questions
Exam 12: Building Information Systems and Managing Projects90 Questions
Select questions type
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
(Multiple Choice)
4.8/5
(29)
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
(Multiple Choice)
4.9/5
(33)
You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.
(Essay)
4.8/5
(31)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.7/5
(30)
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
(True/False)
4.9/5
(36)
Smaller firms may outsource some or many security functions to:
(Multiple Choice)
4.9/5
(28)
To secure mobile devices, a company will need to implement special mobile device management software.
(True/False)
4.9/5
(36)
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
(Multiple Choice)
4.9/5
(38)
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.9/5
(46)
In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
(True/False)
4.9/5
(28)
Computer forensics tasks include all of the following except:
(Multiple Choice)
5.0/5
(39)
Smartphones have the same security flaws as other Internet-connected devices.
(True/False)
4.8/5
(35)
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
(Multiple Choice)
4.9/5
(35)
Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.
(Essay)
4.9/5
(38)
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
(True/False)
4.8/5
(37)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)