Exam 8: Securing Information Systems
Exam 1: Information Systems in Business Today108 Questions
Exam 2: How Businesses Use Information Systems114 Questions
Exam 3: Information Systems organizations and Strategy108 Questions
Exam 4: Social ethical and Legal Issues in the Digital Firm105 Questions
Exam 5: It Infrastructure and Emerging Technologies115 Questions
Exam 6: Databases and Information Management115 Questions
Exam 7: Telecommunications the Internet and Wireless Technology120 Questions
Exam 8: Securing Information Systems114 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers117 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods119 Questions
Exam 11: Managing Knowledge119 Questions
Exam 12: Enhancing Decision Making118 Questions
Exam 13: Developing Information Systems118 Questions
Exam 14: Project Management business Value and Managing Change119 Questions
Exam 15: Managing Global Systems119 Questions
Select questions type
Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise.List at least five Internet security challenges.
(Essay)
4.8/5
(46)
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.
(Multiple Choice)
4.9/5
(50)
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
(True/False)
4.8/5
(32)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.9/5
(34)
For 100% availability,online transaction processing requires
(Multiple Choice)
4.8/5
(38)
Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.
(True/False)
4.8/5
(42)
___________________________ focuses on how the company can restore business operations after a disaster strikes.
(Multiple Choice)
4.8/5
(31)
A ___________________________ is typically used to denote a hacker with criminal intent.
(Multiple Choice)
4.7/5
(44)
The intentional disruption of a Web site or information system is called ________.
(Short Answer)
4.9/5
(32)
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
(True/False)
4.9/5
(42)
Which of the following statements about the Internet security is not true?
(Multiple Choice)
4.9/5
(28)
Which of the following is not one of the main firewall screening techniques?
(Multiple Choice)
4.8/5
(38)
Security are methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its records,and operational adherence to management standards.
(True/False)
4.8/5
(41)
Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.
(True/False)
4.7/5
(45)
Showing 41 - 60 of 114
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)