Exam 10: Information Systems Security
Exam 1: The Importance of MIS80 Questions
Exam 2: Business Processes, information Systems, and Information89 Questions
Exam 3: Organizational Strategy, information Systems, and Competitive Advantage96 Questions
Exam 4: Hardware and Software80 Questions
Exam 5: Database Processing80 Questions
Exam 6: The Cloud74 Questions
Exam 7: Organizations and Information Systems84 Questions
Exam 8: Social Media Information Systems91 Questions
Exam 9: Business Intelligence Systems92 Questions
Exam 10: Information Systems Security93 Questions
Exam 11: Information Systems Management80 Questions
Exam 12: Information Systems Development80 Questions
Exam 13: Collaboration Information Systems for Decision Making problem Solving and Project Management46 Questions
Exam 14: Collaborative Information Systems for Student Projects53 Questions
Exam 15: Mobile Systems50 Questions
Exam 16: Introduction to Microsoft Excel 201348 Questions
Exam 17: Database Design44 Questions
Exam 18: Using Microsoft Access 201348 Questions
Exam 19: Using Excel and Access Together50 Questions
Exam 20: Network and Cloud Technology62 Questions
Exam 21: Enterprise Resource Planning ERP Systems50 Questions
Exam 22: Supply Chain Management40 Questions
Exam 23: Enterprise Social Networks and Knowledge Management40 Questions
Exam 24: Database Marketing40 Questions
Exam 25: Reporting Systems and OLAP44 Questions
Exam 26: Data Breaches50 Questions
Exam 27: International Mis41 Questions
Exam 28: Systems Development Project Management44 Questions
Exam 29: Agile Development44 Questions
Exam 30: Business Process Management40 Questions
Select questions type
A(n)________ is a sophisticated,possibly long-running computer hack that is perpetrated by large,well-funded organizations like governments.
(Multiple Choice)
5.0/5
(40)
Which of the following statements is true of the financial losses due to computer crimes?
(Multiple Choice)
4.8/5
(33)
Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.
(True/False)
4.9/5
(43)
What are some of the recommended personal security safeguards against security threats?
(Essay)
4.8/5
(39)
The loss of encryption keys by employees is referred to as key escrow.
(True/False)
4.7/5
(46)
Davian,a professional hacker,tries every possible combination of characters to crack his victim's email password.Using this technique,he can crack a six-character password of either upper- or lowercase letters in about five minutes.Which of the following techniques is used by Davian to obtain access to his victim's email?
(Multiple Choice)
4.9/5
(39)
________ is a broad category of software that includes viruses,worms,Trojan horses,spyware,and adware.
(Multiple Choice)
4.8/5
(36)
A ________ is a plastic card that has a microchip loaded with identifying data.
(Multiple Choice)
4.9/5
(48)
To safeguard data against security threats,every information system today requires a user name and a password.In this case,which of the following functions is performed by the user name?
(Multiple Choice)
4.9/5
(25)
Which of the following is a human safeguard against security threats?
(Multiple Choice)
5.0/5
(29)
Explain how secure sockets layer works when a user communicates securely with a Web site.
(Essay)
4.8/5
(35)
A threat is a person or an organization that seeks to obtain or alter data illegally,without the owner's permission or knowledge.
(True/False)
4.9/5
(32)
Spoofing is a technique for intercepting computer communications.
(True/False)
4.9/5
(32)
Wardrivers are those who engage in phishing to obtain unauthorized access to data.
(True/False)
4.8/5
(35)
Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?
(Multiple Choice)
4.8/5
(35)
Technical safeguards involve both software and hardware components of an information system.
(True/False)
4.8/5
(45)
In the case of public key encryption,each site has a private key to encode a message and a public key to decode it.
(True/False)
4.8/5
(41)
A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)