Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems86 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems147 Questions
Exam 3: Ethics and Privacy74 Questions
Exam 4: Information Security and Controls129 Questions
Exam 5: Data and Knowledge Management116 Questions
Exam 6: Telecommunications and Networking141 Questions
Exam 7: E-Business and E-Commerce123 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce123 Questions
Exam 9: Social Computing83 Questions
Exam 10: Information Systems Within the Organization118 Questions
Exam 11: Customer Relationship Management and Supply Chain Management175 Questions
Exam 12: Business Intelligence109 Questions
Exam 13: Acquiring Information Systems and Applications135 Questions
Exam 14: Technology Guide 1 : Hardware81 Questions
Exam 15: Technology Guide 2 : Software59 Questions
Exam 16: Technology Guide 3 : Cloud Computing65 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets55 Questions
Select questions type
Which of the following factors is not increasing the threats to information security?
(Multiple Choice)
4.8/5
(44)
The cost of a stolen laptop includes all of the following except:
(Multiple Choice)
4.8/5
(33)
Auditing _____________ the computer means inputs, outputs, and processing are checked.
(Multiple Choice)
4.9/5
(43)
A _____ is intellectual work that is known only to a company and is not based on public information.
(Multiple Choice)
4.9/5
(45)
Risk is the ___________ that a threat will impact information resources.
(Short Answer)
4.7/5
(36)
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.
(Multiple Choice)
4.9/5
(40)
Unintentional threats to information systems include all of the following except:
(Multiple Choice)
4.8/5
(39)
Which of the following is not an example of a weak password?
(Multiple Choice)
4.8/5
(20)
Which of the following is not a reason it is difficult to protect information resources?
(Multiple Choice)
4.9/5
(37)
Cybercriminals can obtain the information they need in order to assume another person's identity by:
(Multiple Choice)
4.8/5
(39)
Which of the following is not a way you can protect yourself online?
(Multiple Choice)
4.7/5
(36)
The employees who pose the biggest risk to information security work in _____________.
(Multiple Choice)
4.8/5
(38)
In _____, the organization takes concrete actions against risks.
(Multiple Choice)
4.9/5
(26)
In most cases, cookies track your path through websites and are therefore invasions of your privacy.
(True/False)
4.8/5
(41)
The security of each computer on the Internet is independent of the security of all other computers on the Internet.
(True/False)
4.7/5
(28)
The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer.
(Multiple Choice)
5.0/5
(52)
_____ are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.
(Multiple Choice)
5.0/5
(44)
Which of the following statements concerning firewalls is not true?
(Multiple Choice)
4.8/5
(41)
Risk is the ___________ that a threat will impact information resources.
(Short Answer)
4.8/5
(31)
Showing 101 - 120 of 129
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)