Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure: Hardware and Software90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Improving Decision Making and Managing Knowledge90 Questions
Exam 12: Building Information Systems and Managing Projects90 Questions
Select questions type
DoS attacks are used to destroy information and access restricted areas of a company's information system.
(True/False)
4.9/5
(37)
Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?
(Essay)
4.7/5
(41)
Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?
(Essay)
4.8/5
(30)
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
(Multiple Choice)
4.8/5
(33)
Which of the following is not an example of a computer used as an instrument of crime?
(Multiple Choice)
4.9/5
(36)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.8/5
(29)
A walkthrough is a type of software testing used before software is even written.
(True/False)
4.8/5
(42)
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
(Multiple Choice)
4.8/5
(43)
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
(Essay)
4.9/5
(44)
Currently, the protocols used for secure information transfer over the Internet are:
(Multiple Choice)
4.9/5
(39)
Which of the following statements about the Internet security is not true?
(Multiple Choice)
4.9/5
(37)
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
(Multiple Choice)
4.9/5
(31)
For 100 percent availability, online transaction processing requires:
(Multiple Choice)
4.8/5
(38)
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
(True/False)
4.9/5
(29)
Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss from this exposure?
(Multiple Choice)
4.9/5
(40)
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
(Essay)
4.8/5
(31)
Showing 61 - 80 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)