Exam 4: Information Security
Exam 1: Introduction to Information Systems68 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems68 Questions
Exam 3: Ethics and Privacy66 Questions
Exam 4: Information Security75 Questions
Exam 5: Data and Knowledge Management73 Questions
Exam 6: Telecommunications and Networking74 Questions
Exam 7: E-Business and E-Commerce66 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce75 Questions
Exam 9: Social Computing78 Questions
Exam 10: Information Systems Within the Organization70 Questions
Exam 11: Customer Relationship Management and Supply Chain Management85 Questions
Exam 12: Business Analytics66 Questions
Exam 13: Acquiring Information Systems and Applications68 Questions
Exam 14: Technology Guide 1 : Hardware65 Questions
Exam 15: Technology Guide 2 : Software46 Questions
Exam 16: Technology Guide 3 : Fundamentals of Relational Database Operations70 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Select questions type
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
Blacklisting is when everything can run except what is on the list.
Free
(True/False)
5.0/5
(31)
Correct Answer:
True
A ___________ is an attack by a programmer developing a system.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
A
The main problem with multifactor authentication is _____________.
(Multiple Choice)
4.9/5
(36)
_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
(Multiple Choice)
4.8/5
(37)
Which country is currently in a dispute with the US over bilateral hacking?
(Multiple Choice)
4.9/5
(34)
________________ is software that causes pop-up advertisements to appear on your screen.
(Short Answer)
4.7/5
(23)
You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.
(Multiple Choice)
4.8/5
(32)
Tracking down cybercriminals is the most difficult and only real challenge authorities face.
(True/False)
4.8/5
(35)
Janitors are no threat to information security since they have no access to company systems.
(True/False)
4.8/5
(46)
According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.
(Multiple Choice)
4.8/5
(41)
Social engineering is a(n)___________ threat on the part of the employee and a(n)_________ threat on the part of the social engineer.
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)