Exam 8: Securing Information Systems
Exam 1: Information Systems in Business Today108 Questions
Exam 2: How Businesses Use Information Systems114 Questions
Exam 3: Information Systems organizations and Strategy108 Questions
Exam 4: Social ethical and Legal Issues in the Digital Firm105 Questions
Exam 5: It Infrastructure and Emerging Technologies115 Questions
Exam 6: Databases and Information Management115 Questions
Exam 7: Telecommunications the Internet and Wireless Technology120 Questions
Exam 8: Securing Information Systems114 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers117 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods119 Questions
Exam 11: Managing Knowledge119 Questions
Exam 12: Enhancing Decision Making118 Questions
Exam 13: Developing Information Systems118 Questions
Exam 14: Project Management business Value and Managing Change119 Questions
Exam 15: Managing Global Systems119 Questions
Select questions type
PKI is the use of public key cryptography working with a(n)________.
(Short Answer)
4.8/5
(39)
________ refers to the ability to know that a person is who he or she claims to be.
(Short Answer)
4.8/5
(27)
Which of the following is not a trait used for identification in biometric systems?
(Multiple Choice)
4.9/5
(32)
In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
(Multiple Choice)
4.8/5
(36)
____________________ govern the design,security,and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.
(Short Answer)
4.7/5
(36)
Which of the following is the greatest threat that employees pose to an organization's information systems?
(Multiple Choice)
4.9/5
(41)
In 2004,ICQ users were enticed by a sales message from a supposed anti-virus vendor.On the vendor's site,a small program called Mitglieder was downloaded to the user's machine.The program enabled outsiders to infiltrate the user's machine.What type of malware is this an example of?
(Multiple Choice)
4.9/5
(34)
___________________________ oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.
(Multiple Choice)
4.7/5
(36)
How is the security of a firm's information system and data affected by its people,organization,and technology? Is the contribution of one of these dimensions any more important than the other? Why?
(Essay)
4.8/5
(42)
___________________________ ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.
(Multiple Choice)
4.8/5
(30)
When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called ________.
(Short Answer)
4.9/5
(26)
An ___________________________ examines the firm's overall security environment as well as controls governing individual information systems.
(Multiple Choice)
4.8/5
(42)
How do software vendors correct flaws in their software after it has been distributed?
(Multiple Choice)
4.9/5
(47)
Electronic data are more susceptible to destruction,fraud,error,and misuse because information systems concentrate data in computer files that
(Multiple Choice)
4.8/5
(27)
A Trojan horse is a software program that appears to be benign but then does something other than expected.
(True/False)
4.8/5
(39)
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
(True/False)
4.9/5
(36)
________ is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
(Short Answer)
4.9/5
(44)
Showing 61 - 80 of 114
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)