Exam 8: Securing Information Systems
Exam 1: Information Systems in Business Today108 Questions
Exam 2: How Businesses Use Information Systems114 Questions
Exam 3: Information Systems organizations and Strategy108 Questions
Exam 4: Social ethical and Legal Issues in the Digital Firm105 Questions
Exam 5: It Infrastructure and Emerging Technologies115 Questions
Exam 6: Databases and Information Management115 Questions
Exam 7: Telecommunications the Internet and Wireless Technology120 Questions
Exam 8: Securing Information Systems114 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers117 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods119 Questions
Exam 11: Managing Knowledge119 Questions
Exam 12: Enhancing Decision Making118 Questions
Exam 13: Developing Information Systems118 Questions
Exam 14: Project Management business Value and Managing Change119 Questions
Exam 15: Managing Global Systems119 Questions
Select questions type
In a walkthrough,hackers are able to bypass security controls of a system with little opposition.
(True/False)
4.8/5
(29)
Currently,the protocols used for secure information transfer over the Internet are
(Multiple Choice)
4.8/5
(34)
You have been hired as a security consultant for a law firm.Which of the following constitutes the greatest source of security threats to the firm?
(Multiple Choice)
5.0/5
(39)
Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?
(Essay)
5.0/5
(41)
A ___________________________ is typically used to denote a hacker with criminal intent.
(Multiple Choice)
4.9/5
(45)
Which of the following is not an example of a computer used as an instrument of crime?
(Multiple Choice)
4.8/5
(31)
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
(True/False)
4.8/5
(41)
A(n)________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.
(Multiple Choice)
4.8/5
(33)
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
(Short Answer)
4.7/5
(34)
Wireless networks in many locations do not have basic protections against war driving in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic.
(True/False)
4.8/5
(36)
Cyber vandalism occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.
(True/False)
4.8/5
(32)
___________________________ ensure that computer hardware is physically secure and check for equipment malfunction.
(Multiple Choice)
4.9/5
(37)
Controls refers to the policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems.
(True/False)
4.9/5
(38)
Why is software quality important to security? What specific steps can an organization take to ensure software quality?
(Essay)
4.8/5
(28)
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(True/False)
4.8/5
(46)
Malicious software programs referred to as ________ include a variety of threats such as computer viruses,worms,and Trojan horses.
(Short Answer)
4.8/5
(38)
Define a fault-tolerant computer system and a high-availability computer system.How do they differ? When would each be used?
(Essay)
4.8/5
(37)
________ refers to policies,procedures,and technical measures used to prevent unauthorized access,alternation,theft,or physical damage to information systems.
(Multiple Choice)
4.9/5
(38)
__________________________ are independent computer programs that copy themselves from one computer to other computers over a network.
(Short Answer)
4.9/5
(42)
Showing 21 - 40 of 114
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)