Exam 5: Information Systems Security
Exam 1: The Importance of MIS119 Questions
Exam 2: Business Processes, Information Systems, and Information128 Questions
Exam 3: Networks and the Cloud92 Questions
Exam 4: Database Processing124 Questions
Exam 5: Information Systems Security117 Questions
Exam 6: Using Is to Improve Processes116 Questions
Exam 7: Supporting Processes With ERP Systems108 Questions
Exam 8: Supporting the Procurement Process With SAP97 Questions
Exam 9: Supporting the Sales Process With SAP102 Questions
Exam 10: Collaboration and IS106 Questions
Exam 11: Social Media and IS121 Questions
Exam 12: Business Intelligence and IS126 Questions
Select questions type
Given appropriate job descriptions,user accounts should be defined to give users the most possible privilege needed to perform their jobs.
(True/False)
4.8/5
(31)
Companies that invest in _________ have been shown to reduce the frequency and severity of their security losses.
(Multiple Choice)
4.7/5
(38)
______________ result/s when authorized users follow appropriate procedures for system use and recovery.
(Multiple Choice)
4.7/5
(36)
A/n ________ is a computing device that prevents unauthorized network access.
(Multiple Choice)
4.8/5
(34)
If the vendor does not use https,it is still safe to use that online vendor.
(True/False)
4.8/5
(40)
Which of these following is a true statement about safeguards:
(Multiple Choice)
4.9/5
(37)
What are the two main sources of security threats? Provide examples for each one.
(Essay)
4.7/5
(27)
Security is rarely breached,and the frequency of security breaches will slow down in the future.
(True/False)
4.9/5
(36)
The process ____________of verifies the credentials of the individual seeking access to a computer resource.
(Multiple Choice)
4.9/5
(41)
Human errors and mistakes include accidental or unintended problems caused by both employees and nonemployees.
(True/False)
4.8/5
(37)
Departmental personnel should develop procedures for system recovery.
(True/False)
4.8/5
(32)
What is a firewall and how do they work? What are two types of firewalls?
(Essay)
4.9/5
(37)
__________is the process of reducing the vulnerabilities of a computer by restricting the functions and actions it is willing to perform.
(Multiple Choice)
4.9/5
(40)
When hiring for high-sensitivity positions,extensive interviews,references,and background investigations are appropriate.
(True/False)
5.0/5
(37)
Technical safeguards block threats from obtaining an asset by using the hardware and software components of an information system.
(True/False)
4.8/5
(31)
An organization should store some back-up database copies off premises,possibly in a remote location.
(True/False)
4.8/5
(44)
_________blocks access to a computer until the victim pays money to the attacker.
(Multiple Choice)
4.8/5
(46)
Showing 61 - 80 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)