Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making90 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
B
PKI is the use of public key cryptography working with a(n) ________.
Free
(Short Answer)
4.8/5
(30)
Correct Answer:
certificate authority
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
(Multiple Choice)
4.8/5
(34)
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
(Essay)
4.8/5
(42)
________ refers to the ability to know that a person is who he or she claims to be.
(Short Answer)
4.7/5
(40)
Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
(Multiple Choice)
4.8/5
(40)
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(True/False)
4.8/5
(50)
In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.
(True/False)
4.8/5
(32)
The range of Wi-Fi networks can be extended up to two miles by using external antennae.
(True/False)
4.8/5
(36)
An independent computer program that copies itself from one computer to another over a network is called a
(Multiple Choice)
4.8/5
(35)
How do software vendors correct flaws in their software after it has been distributed?
(Multiple Choice)
4.7/5
(21)
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of
(Multiple Choice)
4.7/5
(37)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.8/5
(22)
DoS attacks are one of the most economically damaging kinds of computer crime.
(True/False)
4.8/5
(32)
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
(Multiple Choice)
4.8/5
(34)
Smaller firms may outsource some or many security functions to
(Multiple Choice)
4.8/5
(49)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)