Exam 7: Securing Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: IT Infrastructure: Hardware and Software90 Questions
Exam 5: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 6: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 7: Securing Information Systems90 Questions
Exam 8: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 9: E-Commerce: Digital Markets,digital Goods90 Questions
Exam 10: Improving Decision Making and Managing Knowledge90 Questions
Exam 11: Building Information Systems and Managing Projects90 Questions
Exam 12: Ethical and Social Issues in Information Systems90 Questions
Select questions type
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n)________ attack.
(Multiple Choice)
4.9/5
(25)
You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.
(Essay)
4.8/5
(41)
Which of the following is not an example of a computer used as an instrument of crime?
(Multiple Choice)
4.8/5
(38)
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
(Multiple Choice)
4.9/5
(27)
DoS attacks are used to destroy information and access restricted areas of a company's information system.
(True/False)
4.8/5
(30)
Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.
(True/False)
5.0/5
(35)
How do software vendors correct flaws in their software after it has been distributed?
(Multiple Choice)
4.9/5
(34)
An independent computer program that copies itself from one computer to another over a network is called a:
(Multiple Choice)
4.8/5
(37)
Define a fault-tolerant computer system and a high-availability computer system.How do they differ? When would each be used?
(Essay)
4.9/5
(45)
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(True/False)
4.7/5
(33)
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
(Multiple Choice)
4.9/5
(38)
An acceptable use policy defines the acceptable level of access to information assets for different users.
(True/False)
4.8/5
(38)
In controlling network traffic to minimize slow-downs,a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
(Multiple Choice)
4.8/5
(23)
Hackers and their companion viruses are an increasing problem,especially on the Internet.What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?
(Essay)
4.8/5
(43)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)