Exam 13: Information Security Management
Exam 1: The Importance of Mis124 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Information Systems for Competitive Advantage101 Questions
Exam 4: Hardware and Software126 Questions
Exam 5: Database Processing138 Questions
Exam 6: Data Communications132 Questions
Exam 7: How the Internet Works58 Questions
Exam 8: Business Process Management153 Questions
Exam 9: E-Commerce and Web 2.0120 Questions
Exam 10: Business Intelligence Systems131 Questions
Exam 11: Managing Development128 Questions
Exam 12: Information Systems Management120 Questions
Exam 13: Information Security Management137 Questions
Exam 14: International Dimension 1 - the Global Economy19 Questions
Exam 15: International Dimension 2 - Global Communication19 Questions
Exam 16: International Dimension 3 - Global Is and the Value Chain19 Questions
Exam 17: International Dimension 4 - International It Management and Development19 Questions
Select questions type
Which of the following is the first step in risk management?
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
D
Which of the following observations concerning Secure Socket Layer (SSL)is true?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
An example of a system-specific security policy would be ________.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial-of-service attack.
(True/False)
4.9/5
(39)
Users should scan their computers with anti-malware programs at least ________.
(Multiple Choice)
4.7/5
(38)
________ occurs when a person gains unauthorized access to a computer system.
(Multiple Choice)
4.8/5
(35)
When an employee notices a virus on his or her machine,the ________ plan should specify what to do.
(Multiple Choice)
4.8/5
(36)
________ is when someone deceives by pretending to be someone else.
(Multiple Choice)
4.9/5
(32)
Which of the following usually happens in a malicious denial-of-service attack?
(Multiple Choice)
4.8/5
(34)
Which of the following observations is true of a cold site?
(Multiple Choice)
4.7/5
(33)
Because encryption slows processing,most messages are sent over the Internet as ________.
(Multiple Choice)
4.8/5
(34)
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
(True/False)
4.9/5
(36)
Which of the following is an example of a technical safeguard?
(Multiple Choice)
4.8/5
(35)
________ is the term used to denote viruses,worms,Trojan horses,spyware,and adware.
(Multiple Choice)
5.0/5
(30)
What is a security threat? What are the three general sources of security threats?
(Essay)
4.9/5
(30)
________ a site means to take extraordinary measures to reduce a system's vulnerability.
(Multiple Choice)
4.8/5
(35)
When an account is created,the new user should continue to use the safe password provided to him.
(True/False)
4.8/5
(24)
Showing 1 - 20 of 137
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)