Exam 21: Plug It in 6 Project Management
Exam 1: Introduction to Information Systems103 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems85 Questions
Exam 3: Data and Knowledge Management62 Questions
Exam 4: Telecommunications and Networking98 Questions
Exam 5: Business Analytics82 Questions
Exam 6: Ethics and Privacy54 Questions
Exam 7: Information Security87 Questions
Exam 8: Social Computing64 Questions
Exam 9: E-Business and E-Commerce85 Questions
Exam 10: Wireless, Mobile Computing, and Mobile Commerce79 Questions
Exam 11: Information Systems Within the Organization69 Questions
Exam 12: Customer Relationship Management62 Questions
Exam 13: Supply Chain Management42 Questions
Exam 14: Acquiring Information Systems and Applications88 Questions
Exam 15: Plug It in 7 Protecting Your Information Assets40 Questions
Exam 16: Plug It in 1 Business Processes and Business Process Management28 Questions
Exam 17: Plug It in 2 Hardware and Soft Ware14 Questions
Exam 18: Plug It in 3 Fundamentals of Relational Database Operations29 Questions
Exam 19: Plug It in 4 Cloud Computing18 Questions
Exam 20: Plug It in 5 Artificial Intelligence23 Questions
Exam 21: Plug It in 6 Project Management38 Questions
Select questions type
You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information because you have been proactive. Which of the following is not one of your proactive actions?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
E
Personal firewalls perform all of the following functions except:
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
Which of the following is a bad password?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
E
It is possible for criminals to gain information about many people from social networking sites.
(True/False)
4.8/5
(34)
Social engineering attacks are a threat at work but typically not at home.
(True/False)
4.9/5
(39)
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.
(Multiple Choice)
4.9/5
(42)
Companies that provide proactive protection of your personal information allow customers to lock their credit files.
(True/False)
4.8/5
(45)
The security considerations for wireless networks are greater than those for wired networks.
(True/False)
4.9/5
(29)
Victims of identity theft should first and foremost contact the Federal Trade Commission (FTC).
(True/False)
4.8/5
(31)
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
(True/False)
4.8/5
(30)
Which of the following attacks is most closely associated with downloading and installing patches immediately?
(Multiple Choice)
4.9/5
(30)
You should update your definitions before scanning your system with anti-malware software.
(True/False)
4.8/5
(34)
You got careless and left your laptop in a taxi back from the airport. You are very worried about the security of the data because your operating system does not require a password at start-up. Which of the following will give you some measure of comfort?
(Multiple Choice)
4.9/5
(38)
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. After running anti-malware and anti-virus … and cleaning up your laptop … you decide you need something that will do a better job of blocking communications based on security settings. Which of the following statements would you install?
(Multiple Choice)
4.9/5
(32)
One strategy for controlling spam is to set up multiple free e-mail accounts.
(True/False)
4.9/5
(36)
Which of the following actions will not help protect your information assets?
(Multiple Choice)
4.9/5
(38)
Which of the following statements about companies that provide proactive protection of your information assets is false?
(Multiple Choice)
4.8/5
(44)
Showing 1 - 20 of 38
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)