Exam 7: Securing Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: IT Infrastructure: Hardware and Software90 Questions
Exam 5: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 6: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 7: Securing Information Systems90 Questions
Exam 8: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 9: E-Commerce: Digital Markets,digital Goods90 Questions
Exam 10: Improving Decision Making and Managing Knowledge90 Questions
Exam 11: Building Information Systems and Managing Projects90 Questions
Exam 12: Ethical and Social Issues in Information Systems90 Questions
Select questions type
SSL is a protocol used to establish a secure connection between two computers.
Free
(True/False)
4.8/5
(39)
Correct Answer:
True
You have been hired as a security consultant for a law firm.Which of the following constitutes the greatest source of security threats to the firm?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.9/5
(41)
High-availability computing is also referred to as fault tolerance.
(True/False)
4.8/5
(36)
Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.
(Multiple Choice)
4.9/5
(30)
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.
(Multiple Choice)
4.8/5
(40)
When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called debugging.
(True/False)
4.8/5
(35)
Which of the following statements about the Internet security is not true?
(Multiple Choice)
4.9/5
(33)
A(n)________ audit examines the firm's overall security environment as well as the controls governing individual information systems.
(Multiple Choice)
4.9/5
(35)
Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?
(Essay)
4.9/5
(35)
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
(True/False)
4.8/5
(37)
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
(Multiple Choice)
4.7/5
(41)
Electronic evidence on computer storage media that is not visible to the average user is called ________ data.
(Multiple Choice)
4.9/5
(36)
Malicious software programs referred to as spyware include a variety of threats such as computer viruses,worms,and Trojan horses.
(True/False)
4.9/5
(32)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)