Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems86 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems147 Questions
Exam 3: Ethics and Privacy74 Questions
Exam 4: Information Security and Controls129 Questions
Exam 5: Data and Knowledge Management116 Questions
Exam 6: Telecommunications and Networking141 Questions
Exam 7: E-Business and E-Commerce123 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce123 Questions
Exam 9: Social Computing83 Questions
Exam 10: Information Systems Within the Organization118 Questions
Exam 11: Customer Relationship Management and Supply Chain Management175 Questions
Exam 12: Business Intelligence109 Questions
Exam 13: Acquiring Information Systems and Applications135 Questions
Exam 14: Technology Guide 1 : Hardware81 Questions
Exam 15: Technology Guide 2 : Software59 Questions
Exam 16: Technology Guide 3 : Cloud Computing65 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets55 Questions
Select questions type
_______________ assesses the value of each asset being protected, estimates the probability it might be compromised, and compares the probable costs of it being compromised with the cost of protecting it.
(Multiple Choice)
4.9/5
(31)
Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA)system.
(Not Answered)
This question doesn't have any answer yet
_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
(Multiple Choice)
4.8/5
(42)
______________ is when permission is issued to individuals and groups to do certain activities that can be performed by users of the system.
(Short Answer)
4.9/5
(37)
You start a dog-walking service, and you store your client's records on your smart phone. You don't need to worry about information security.
(True/False)
4.7/5
(36)
The computing skills necessary to be a hacker are decreasing for which of the following reasons?
(Multiple Choice)
4.8/5
(37)
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?
(Multiple Choice)
4.9/5
(41)
The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.
(True/False)
4.9/5
(39)
Explain why anti-malware software is classified as reactive.
(Not Answered)
This question doesn't have any answer yet
Risk analysis involves determining whether security programs are working.
(True/False)
4.9/5
(39)
Zero-day attacks use deceptive e-mails to acquire sensitive personal information.
(True/False)
4.8/5
(42)
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?
(Multiple Choice)
4.9/5
(28)
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.
(Multiple Choice)
4.9/5
(49)
The main purpose for the attack on Sony Pictures Entertainment on November 24, 2014, was to stop the release of the movie The Interview.
(True/False)
4.8/5
(47)
Social engineering is when the attacker uses _____________ to trick a legitimate employee into providing confidential company information such as passwords.
(Short Answer)
4.8/5
(30)
A copyright provides creators of intellectual property with ownership of the property for the life of the creator plus _________ years.
(Multiple Choice)
4.9/5
(34)
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.
(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)