Exam 5: Information Systems Security
Exam 1: The Importance of MIS119 Questions
Exam 2: Business Processes, Information Systems, and Information128 Questions
Exam 3: Networks and the Cloud92 Questions
Exam 4: Database Processing124 Questions
Exam 5: Information Systems Security117 Questions
Exam 6: Using Is to Improve Processes116 Questions
Exam 7: Supporting Processes With ERP Systems108 Questions
Exam 8: Supporting the Procurement Process With SAP97 Questions
Exam 9: Supporting the Sales Process With SAP102 Questions
Exam 10: Collaboration and IS106 Questions
Exam 11: Social Media and IS121 Questions
Exam 12: Business Intelligence and IS126 Questions
Select questions type
Which of the following is an example of inadvertent human error:
(Multiple Choice)
4.9/5
(33)
A __________ is a systematic evaluation of security by assessing how well the security safeguards conform to established criteria.
(Multiple Choice)
4.9/5
(35)
Your browser automatically stores a history of your browsing activities and temporary files that contain sensitive data about where you've visited,what you've purchased,and what your account names and passwords are.
(True/False)
4.8/5
(41)
An organization should store all back-up database copies of premises for easier access.
(True/False)
4.8/5
(39)
When criminals replace a legitimate user or software program with their own access or illegitimate software program to give the attacker unauthorized control of some part of the IS,it is known as:
(Multiple Choice)
4.7/5
(37)
A firewall can be a special use computer,or it can be an app on a general-purpose computer or router.
(True/False)
4.8/5
(31)
A user logs onto a banking website with their user id: email address and password: qwerty.This password is very common,so the user is prompted to provide extra information,such as a simple challenge-response exercise,this is an example of:
(Multiple Choice)
4.8/5
(36)
After the initial response to the disaster or incident,computer forensics can help determine
the cause of the event.
(True/False)
4.8/5
(41)
What are the minimum requirements for a company wide security policy include?
(Essay)
4.9/5
(26)
Every organization should have an incident response plan as part of the security program.
(True/False)
4.8/5
(45)
What are some safeguards that can be taken by people/organizations to safeguard against threats and vulnerabilities?
(Essay)
4.9/5
(42)
__________ is a technique for intercepting computer communications.
(Multiple Choice)
4.9/5
(37)
Describe how SSL/TLS works when a system communicates securely with a Web site.
(Essay)
4.8/5
(38)
Describe the three types of impersonation that can lead to data loss and provide an example for each:
(Essay)
4.8/5
(33)
Which of the following is a difference between a public key and a private key?
(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)