Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-To-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media101 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems98 Questions
Exam 8: Strengthening Business-To-Business Relationships Via Supply Chain and Customer Relationship Management100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Appendix: Technology Briefing: Foundations of Information Systems Infrastructure121 Questions
Select questions type
An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
C
The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.
Free
(True/False)
4.9/5
(42)
Correct Answer:
False
________ refers to offering stolen proprietary software for free over the Internet.
Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
B
Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers,and its databases contain valuable information about the customers.The loss of customer information that is used to decide services would be extremely harmful to the organization.Which of the following strategies adopted by Ciscon is an example of risk transference?
(Multiple Choice)
4.8/5
(33)
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.
(Multiple Choice)
4.9/5
(32)
List the policies and procedures that guide users' decisions and establish responsibilities within an organization.
(Essay)
4.9/5
(32)
Recovery point objectives of a recovery plan specify ________.
(Multiple Choice)
4.8/5
(29)
A ________ is a small text file passed to a Web browser on a user's computer by a Web server.
(Multiple Choice)
4.7/5
(37)
Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.
(True/False)
4.8/5
(31)
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.
(Multiple Choice)
4.7/5
(26)
An account management policy explains technical controls on all organizational computer systems,such as access limitations,audit-control software,firewalls,and so on.
(True/False)
4.8/5
(37)
A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
(Multiple Choice)
4.9/5
(30)
A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.
(True/False)
4.8/5
(34)
Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?
(Multiple Choice)
4.8/5
(31)
Control objectives for information and related technology (COBIT)is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and establish appropriate controls.
(True/False)
5.0/5
(33)
Which of the following is one of the main federal laws against computer crimes in the United States?
(Multiple Choice)
4.8/5
(39)
Implementing encryption on a large scale,such as on a busy Web site,requires a third party,called a(n)________.
(Multiple Choice)
4.9/5
(34)
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.
(True/False)
4.9/5
(33)
Showing 1 - 20 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)