Exam 8: Security
Exam 1: Introduction14 Questions
Exam 2: The Information Systems Strategy Triangle52 Questions
Exam 3: Strategic Use of Information Resources63 Questions
Exam 4: Organizational Strategy and Information Systems53 Questions
Exam 5: Information Systems and the Design of Work55 Questions
Exam 6: Information Systems and Business Transformation60 Questions
Exam 7: Architecture and Infrastructure57 Questions
Exam 8: Security40 Questions
Exam 9: The Business of Information Technology71 Questions
Exam 10: Governance of the Information Systems Organization48 Questions
Exam 11: Information Systems Sourcing54 Questions
Exam 12: Managing IT Projects60 Questions
Exam 13: Business Intelligence Knowledge Management and Analytics53 Questions
Exam 14: Privacy and Ethical Considerations in Information Management47 Questions
Select questions type
Internal threats are considered the most lethal threat. What are they, why are they so lethal and what can a company do to protect against them?
Free
(Essay)
4.7/5
(41)
Correct Answer:
On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
D
Two factor authentication is when you use two different methods for people trying to use the system. For instance, you can use a password and a challenge question
Free
(True/False)
5.0/5
(38)
Correct Answer:
True
When the Office of Personnel Management was hacked, all of the following are true except:
(Multiple Choice)
4.9/5
(39)
In the Office of Personnel Management's case, the security breach made many people vulnerable to this.
(Multiple Choice)
4.8/5
(41)
A challenge question is when you are stopped at the gate and the guard asks who you are.
(True/False)
4.9/5
(36)
Who is responsible for developing security education, awareness, and training programs?
(Multiple Choice)
4.7/5
(36)
In the Target breach, the IT department was warned on or about the time the files were transferred.
(True/False)
4.8/5
(41)
In the Target breach, the HVAC systems were actually attached to the retail sales system.
(True/False)
4.8/5
(34)
What is a piece of software that traps keystrokes and stores them for hackers to inspect later?
(Short Answer)
4.8/5
(38)
A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.
(True/False)
4.7/5
(36)
In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:
(Multiple Choice)
4.9/5
(22)
Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
(Multiple Choice)
4.9/5
(33)
It is estimated that ___ % of all firms have been breached:
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)