Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-To-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media101 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems98 Questions
Exam 8: Strengthening Business-To-Business Relationships Via Supply Chain and Customer Relationship Management100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Appendix: Technology Briefing: Foundations of Information Systems Infrastructure121 Questions
Select questions type
Robert receives an e-mail which says that he has won an online lottery worth $50 billion.Robert has his doubts as he does not remember buying a lottery ticket.He finds out that it is a spam e-mail intended to obtain his bank account details and credit card number.Which of the following is evident here?
(Multiple Choice)
4.9/5
(38)
Corrective controls are used to mitigate the impact of any problem after it has arisen,such as restoring compromised data.
(True/False)
4.7/5
(30)
Which of the following is the most accurate definition of a botnet?
(Multiple Choice)
4.8/5
(40)
With ________,employees may be identified by fingerprints,retinal patterns in the eye,facial features,or other bodily characteristics before being granted access to use a computer or to enter a facility.
(Multiple Choice)
4.9/5
(34)
What is unauthorized access? Provide a few examples for unauthorized access.
(Essay)
4.9/5
(30)
While adding information to the employee information database,Neil's computer crashed,and the entire database was erased.Which of the following types of viruses caused Neil's computer to crash?
(Multiple Choice)
4.8/5
(32)
________ refers to precautions taken to keep all aspects of information systems safe from destruction,manipulation,or unauthorized use or access.
(Multiple Choice)
4.8/5
(48)
Recovery point objectives are used to specify how current the backup data should be.
(True/False)
4.8/5
(41)
An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.
(Multiple Choice)
4.8/5
(29)
The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.
(Multiple Choice)
4.8/5
(31)
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.
(Multiple Choice)
4.8/5
(34)
The act of cybercriminals to gain information on a victim by monitoring online activities,accessing databases,and making false accusations are forms of ________.
(Multiple Choice)
4.8/5
(37)
When a company uses a fingerprint recognition system instead of access cards,it helps the company prevent unauthorized physical access.Which of the following technologies is used for authentication here?
(Multiple Choice)
4.9/5
(32)
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.
(Multiple Choice)
4.8/5
(30)
________ is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments.
(Multiple Choice)
4.9/5
(35)
Which of the following is a valid observation about encryption?
(Multiple Choice)
4.8/5
(37)
Showing 81 - 100 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)