Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-To-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media101 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems98 Questions
Exam 8: Strengthening Business-To-Business Relationships Via Supply Chain and Customer Relationship Management100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Appendix: Technology Briefing: Foundations of Information Systems Infrastructure121 Questions
Select questions type
________ refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.
(Multiple Choice)
4.8/5
(35)
Controls that are used to assess whether anything went wrong,such as unauthorized access attempts,are called ________ controls.
(Multiple Choice)
4.7/5
(33)
Information dissemination refers to the use of Web sites to provide information for recruiting new members as well as utilizing more interactive Internet technologies.
(True/False)
4.8/5
(35)
WikiLeaks is a famous not-for-profit whistleblower Web site.MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site.An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this.These Web vandals,who tried to protect WikiLeaks,are called ________.
(Multiple Choice)
4.7/5
(35)
________ are false messages circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.
(Multiple Choice)
4.8/5
(33)
A hot backup site is an empty warehouse with all necessary connections for power and communication.
(True/False)
4.8/5
(31)
The ________ is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and to establish appropriate controls.
(Multiple Choice)
4.8/5
(44)
List the commonly used methods in which technology is employed to safeguard information systems.
(Essay)
4.8/5
(38)
Patents generally refer to creations of the mind such as music,literature,or software.
(True/False)
4.9/5
(41)
Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?
(Multiple Choice)
4.9/5
(43)
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.
(Multiple Choice)
4.9/5
(42)
Making false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites is a form of cyberstalking.
(True/False)
4.9/5
(37)
Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls.This process is called ________.
(Multiple Choice)
4.9/5
(34)
People who break into computer systems with the intention of doing damage or committing a crime are called ________.
(Multiple Choice)
4.8/5
(38)
Information systems ________ is done to obtain an understanding of the threats to the confidentiality,integrity,and availability of data and systems.
(Multiple Choice)
4.9/5
(39)
Glassico Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a countermeasure,the company installs strong firewalls and protective software.These steps are a part of ________.
(Multiple Choice)
4.9/5
(37)
________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.
(Multiple Choice)
4.9/5
(37)
________ is the use of formal investigative techniques to evaluate digital information for judicial review.
(Multiple Choice)
4.9/5
(39)
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.
(Multiple Choice)
4.8/5
(45)
A honeypot is a computer,data,or network site that is used to penetrate other networks and computer systems to snoop or to cause damage.
(True/False)
4.9/5
(33)
Showing 61 - 80 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)