Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology89 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.7/5
(40)
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as
(Multiple Choice)
4.9/5
(36)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.8/5
(41)
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
(True/False)
4.9/5
(36)
Organizations can use existing network security software to secure mobile devices.
(True/False)
4.8/5
(37)
Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
(Multiple Choice)
4.9/5
(39)
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
(Multiple Choice)
4.7/5
(35)
Client software in a client/server environment is specifically vulnerable to
(Multiple Choice)
4.9/5
(43)
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
(Multiple Choice)
4.7/5
(29)
All of the following are types of information systems general controls except
(Multiple Choice)
4.9/5
(45)
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
(Multiple Choice)
4.8/5
(41)
You can test software before it is even written by conducting a walkthrough.
(True/False)
4.8/5
(31)
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called
(Multiple Choice)
4.8/5
(35)
Is the cloud a safer and more secure computing environment than an in-house network?
Why or why not?
(Essay)
4.8/5
(41)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)