Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making90 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
Which of the following does not pose a security threat to wireless networks?
(Multiple Choice)
4.8/5
(41)
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
(Essay)
4.8/5
(40)
The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.
(True/False)
5.0/5
(39)
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
(Multiple Choice)
4.8/5
(40)
An acceptable use policy defines the acceptable level of access to information assets for different users.
(True/False)
4.9/5
(35)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.8/5
(37)
High-availability computing is also referred to as fault tolerance.
(True/False)
4.9/5
(32)
On the whole, ________ controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
(Short Answer)
4.9/5
(38)
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
(Short Answer)
4.8/5
(33)
Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?
(Essay)
4.8/5
(33)
Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges.
(Essay)
4.8/5
(33)
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
(Multiple Choice)
4.8/5
(43)
Why is software quality important to security? What specific steps can an organization take to ensure software quality?
(Essay)
4.8/5
(34)
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.
(Short Answer)
4.9/5
(31)
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
(True/False)
4.9/5
(48)
________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
(Short Answer)
4.9/5
(40)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)