Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems86 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems147 Questions
Exam 3: Ethics and Privacy74 Questions
Exam 4: Information Security and Controls129 Questions
Exam 5: Data and Knowledge Management116 Questions
Exam 6: Telecommunications and Networking141 Questions
Exam 7: E-Business and E-Commerce123 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce123 Questions
Exam 9: Social Computing83 Questions
Exam 10: Information Systems Within the Organization118 Questions
Exam 11: Customer Relationship Management and Supply Chain Management175 Questions
Exam 12: Business Intelligence109 Questions
Exam 13: Acquiring Information Systems and Applications135 Questions
Exam 14: Technology Guide 1 : Hardware81 Questions
Exam 15: Technology Guide 2 : Software59 Questions
Exam 16: Technology Guide 3 : Cloud Computing65 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets55 Questions
Select questions type
Trojan horses are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.
(True/False)
4.9/5
(44)
A(n)______________ is any danger to which a system may be exposed.
(Multiple Choice)
4.9/5
(38)
______________ is a private network that uses a public network to connect users securely to the organization's internal systems.
(Multiple Choice)
4.9/5
(38)
An information system's _______ is the possibility that the system will be harmed by a threat.
(Multiple Choice)
4.8/5
(37)
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.
(Multiple Choice)
4.8/5
(39)
______________ is a process in which a company allows all software to run unless it is on the list.
(Multiple Choice)
4.8/5
(29)
Organizations use authentication to establish privileges to systems operations.
(True/False)
4.9/5
(30)
Contrast risk acceptance, risk limitation, and risk transference.
(Not Answered)
This question doesn't have any answer yet
Rank the following in terms of dollar value of the crime, from highest to lowest.
(Multiple Choice)
4.9/5
(35)
You start a new job, and Human Resources gives you a 10-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?
(Multiple Choice)
4.8/5
(37)
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.
(Multiple Choice)
4.9/5
(36)
Which of the following is not a factor increasing the vulnerability of information resources?
(Multiple Choice)
4.9/5
(40)
Showing 41 - 60 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)