Exam 7: Securing Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: IT Infrastructure: Hardware and Software90 Questions
Exam 5: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 6: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 7: Securing Information Systems90 Questions
Exam 8: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 9: E-Commerce: Digital Markets,digital Goods90 Questions
Exam 10: Improving Decision Making and Managing Knowledge90 Questions
Exam 11: Building Information Systems and Managing Projects90 Questions
Exam 12: Ethical and Social Issues in Information Systems90 Questions
Select questions type
Authorization refers to the ability to know that a person is who he or she claims to be.
(True/False)
4.9/5
(41)
In 2004,ICQ users were enticed by a sales message from a supposed anti-virus vendor.On the vendor's site,a small program called Mitglieder was downloaded to the user's machine.The program enabled outsiders to infiltrate the user's machine.What type of malware is this an example of?
(Multiple Choice)
4.9/5
(41)
For 100% availability,online transaction processing requires:
(Multiple Choice)
4.9/5
(41)
Statements ranking information risks and identifying security goals are included in a(n):
(Multiple Choice)
4.8/5
(41)
A walkthrough is a type of software testing used before software is even written.
(True/False)
4.7/5
(31)
Specific security challenges that threaten corporate servers in a client/server environment include:
(Multiple Choice)
4.9/5
(37)
Specific security challenges that threaten the communications lines in a client/server environment include:
(Multiple Choice)
4.8/5
(30)
A firewall identifies all of the following characteristics of incoming traffic,except:
(Multiple Choice)
4.8/5
(34)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.8/5
(39)
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
(True/False)
4.9/5
(40)
________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.
(Multiple Choice)
4.9/5
(37)
Smaller firms may outsource some or many security functions to:
(Multiple Choice)
4.9/5
(30)
Computer forensics tasks include all of the following except:
(Multiple Choice)
4.7/5
(38)
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
(Multiple Choice)
4.8/5
(44)
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
(True/False)
4.7/5
(41)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)