Exam 8: Securing Information Systems
Exam 1: Information Systems in Business Today108 Questions
Exam 2: How Businesses Use Information Systems114 Questions
Exam 3: Information Systems organizations and Strategy108 Questions
Exam 4: Social ethical and Legal Issues in the Digital Firm105 Questions
Exam 5: It Infrastructure and Emerging Technologies115 Questions
Exam 6: Databases and Information Management115 Questions
Exam 7: Telecommunications the Internet and Wireless Technology120 Questions
Exam 8: Securing Information Systems114 Questions
Exam 9: Enterprise Applications to Manage Supply Chains and Respond to Customers117 Questions
Exam 10: E-Commerce: Digital Markets and Digital Goods119 Questions
Exam 11: Managing Knowledge119 Questions
Exam 12: Enhancing Decision Making118 Questions
Exam 13: Developing Information Systems118 Questions
Exam 14: Project Management business Value and Managing Change119 Questions
Exam 15: Managing Global Systems119 Questions
Select questions type
An acceptable use policy defines the acceptable level of access to information assets for different users.
(True/False)
4.8/5
(42)
Digital Warfare is a state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks for the purposes of causing damage and disruption
(True/False)
4.8/5
(31)
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
(Multiple Choice)
4.9/5
(39)
In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
(Multiple Choice)
4.8/5
(38)
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.8/5
(40)
Smaller firms may outsource some or many security functions to
(Multiple Choice)
4.7/5
(25)
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up.This is an example of
(Multiple Choice)
4.8/5
(35)
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called
(Multiple Choice)
4.7/5
(36)
Pharming redirects users to a bogus Web page,even when the individual types the correct Web page address into his or her browser.
(True/False)
4.9/5
(31)
___________________________ devises plans for the restoration of computing and communications services after they have been disrupted
(Multiple Choice)
4.8/5
(46)
____________________ ensure that computer hardware is physically secure and check for equipment malfunction.
(Short Answer)
4.9/5
(27)
Which of the following is not one of the challenges in securing wireless networks?
(Multiple Choice)
4.8/5
(30)
High-availability computing is also referred to as fault tolerance.
(True/False)
4.9/5
(38)
Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.
(Short Answer)
4.8/5
(37)
____________________ monitor the use of system software and prevent unauthorized access of software programs,system software,and computer programs.
(Short Answer)
4.7/5
(33)
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
(Multiple Choice)
4.8/5
(37)
A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed,usually without user knowledge or permission.
(True/False)
5.0/5
(38)
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.
(Multiple Choice)
4.8/5
(40)
Showing 81 - 100 of 114
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)