Exam 5: Information Systems Security
Exam 1: The Importance of MIS119 Questions
Exam 2: Business Processes, Information Systems, and Information128 Questions
Exam 3: Networks and the Cloud92 Questions
Exam 4: Database Processing124 Questions
Exam 5: Information Systems Security117 Questions
Exam 6: Using Is to Improve Processes116 Questions
Exam 7: Supporting Processes With ERP Systems108 Questions
Exam 8: Supporting the Procurement Process With SAP97 Questions
Exam 9: Supporting the Sales Process With SAP102 Questions
Exam 10: Collaboration and IS106 Questions
Exam 11: Social Media and IS121 Questions
Exam 12: Business Intelligence and IS126 Questions
Select questions type
Human errors are typically procedure problems: incorrect procedures or procedural
mistakes.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
When you buy something online,you provide your credit card data; when that data is transmitted over the Internet,it is an example of:
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
B
When an unsuspecting user accesses a fake Wi-Fi access point,which has the same name as a legitimate Wi-Fi access point,this is an example of a/an:
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
D
IP spoofing occurs when an intruder uses another site's IP address to masquerade as the other site.
(True/False)
4.9/5
(39)
Security policies depend on whether the organization is governmental or nongovernmental.
(True/False)
4.9/5
(28)
Symmetric encryption is simpler and much faster than asymmetric encryption.
(True/False)
4.8/5
(31)
Users resist biometric identification because they feel it is invasive.
(True/False)
4.9/5
(34)
Which of these following is a true statement about using the cloud?
(Multiple Choice)
4.9/5
(40)
___________are small files that your browser stores on your computer when you visit Web sites.
(Multiple Choice)
4.8/5
(35)
What is a firewall and how do they work? What are two types of firewalls?
(Essay)
4.7/5
(30)
With HTTPS,data are encrypted using a protocol called the _____________.
(Multiple Choice)
4.9/5
(36)
Sniffing is a term used to describe a variety of software that damages or disables computers.
(True/False)
4.8/5
(40)
Which of the following statements is true about biometric authentication?
(Multiple Choice)
5.0/5
(37)
Increasingly security experts view the cloud as the least secure option for transferring security risks.
(True/False)
4.8/5
(33)
Which of the following is not an example of external threat that can affect software?
(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)