Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems86 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems147 Questions
Exam 3: Ethics and Privacy74 Questions
Exam 4: Information Security and Controls129 Questions
Exam 5: Data and Knowledge Management116 Questions
Exam 6: Telecommunications and Networking141 Questions
Exam 7: E-Business and E-Commerce123 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce123 Questions
Exam 9: Social Computing83 Questions
Exam 10: Information Systems Within the Organization118 Questions
Exam 11: Customer Relationship Management and Supply Chain Management175 Questions
Exam 12: Business Intelligence109 Questions
Exam 13: Acquiring Information Systems and Applications135 Questions
Exam 14: Technology Guide 1 : Hardware81 Questions
Exam 15: Technology Guide 2 : Software59 Questions
Exam 16: Technology Guide 3 : Cloud Computing65 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets55 Questions
Select questions type
Your company's headquarters was just hit head-on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?
Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
D
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
B
Authentication and authorization are synonyms.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
Identify and discuss the factors that are contributing to the increasing vulnerability of organizational information assets.
(Not Answered)
This question doesn't have any answer yet
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.
(Multiple Choice)
4.7/5
(40)
Organizations utilize layers of controls because they face so many diverse threats to information security.
(True/False)
4.7/5
(35)
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
(Multiple Choice)
4.8/5
(35)
Contrast the four types of authentication.
(Not Answered)
This question doesn't have any answer yet
____________ is an intellectual work, such as a business plan, that is a company secret and is not based on public information.
(Multiple Choice)
4.9/5
(27)
Employees in which functional areas of the organization pose particularly grave threats to information security?
(Multiple Choice)
4.8/5
(39)
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.
(Multiple Choice)
4.7/5
(41)
Define the principle of least privilege, and consider how an organization's senior executives might view the application of this principle.
(Not Answered)
This question doesn't have any answer yet
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
(Multiple Choice)
4.9/5
(34)
Dumpster diving is always illegal because it involves trespassing on private property.
(True/False)
4.9/5
(42)
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.
(Multiple Choice)
4.8/5
(38)
In the "Catching a Hacker" case study. The purpose of SpyEye is to _____________.
(Multiple Choice)
5.0/5
(36)
Not logging off the company network when gone from the office for any extended period of time is an example of which type of human mistake?
(Multiple Choice)
4.8/5
(29)
According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.
(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)