Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems86 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems147 Questions
Exam 3: Ethics and Privacy74 Questions
Exam 4: Information Security and Controls129 Questions
Exam 5: Data and Knowledge Management116 Questions
Exam 6: Telecommunications and Networking141 Questions
Exam 7: E-Business and E-Commerce123 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce123 Questions
Exam 9: Social Computing83 Questions
Exam 10: Information Systems Within the Organization118 Questions
Exam 11: Customer Relationship Management and Supply Chain Management175 Questions
Exam 12: Business Intelligence109 Questions
Exam 13: Acquiring Information Systems and Applications135 Questions
Exam 14: Technology Guide 1 : Hardware81 Questions
Exam 15: Technology Guide 2 : Software59 Questions
Exam 16: Technology Guide 3 : Cloud Computing65 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets55 Questions
Select questions type
Which of the following is not a strategy for mitigating the risk of threats against information?
(Multiple Choice)
4.9/5
(28)
Walls, doors, and fences are examples of __________ controls.
(Multiple Choice)
4.7/5
(29)
Which of the following is/are designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
(Multiple Choice)
4.7/5
(39)
Being careless with your computing devices is ______________.
(Multiple Choice)
4.8/5
(36)
Social engineering is typically _____________ human error on the part of an employee, but it is _____________ on the part of the attacker.
(Multiple Choice)
4.8/5
(36)
Describe how a digital certificate works.
(Not Answered)
This question doesn't have any answer yet
In _____, the organization purchases insurance as a means to compensate for any loss.
(Multiple Choice)
4.9/5
(33)
Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing.
(Not Answered)
This question doesn't have any answer yet
Which of the following is not a characteristic of strong passwords?
(Multiple Choice)
4.9/5
(46)
Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim's information security strategy.
(Not Answered)
This question doesn't have any answer yet
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?
(Multiple Choice)
4.8/5
(36)
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA)systems to cause widespread physical damage.
(True/False)
4.8/5
(41)
Which of the following statements concerning the difficulties in protecting information resources is not correct?
(Multiple Choice)
4.8/5
(37)
A ___________ site does not include the actual applications the company runs.
(Multiple Choice)
4.8/5
(40)
Describe public key encryption.
(Not Answered)
This question doesn't have any answer yet
Showing 61 - 80 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)