Exam 5: Information Systems Security
Exam 1: The Importance of MIS119 Questions
Exam 2: Business Processes, Information Systems, and Information128 Questions
Exam 3: Networks and the Cloud92 Questions
Exam 4: Database Processing124 Questions
Exam 5: Information Systems Security117 Questions
Exam 6: Using Is to Improve Processes116 Questions
Exam 7: Supporting Processes With ERP Systems108 Questions
Exam 8: Supporting the Procurement Process With SAP97 Questions
Exam 9: Supporting the Sales Process With SAP102 Questions
Exam 10: Collaboration and IS106 Questions
Exam 11: Social Media and IS121 Questions
Exam 12: Business Intelligence and IS126 Questions
Select questions type
A smart card uses personal physical characteristics such as fingerprints,facial features,and retinal scans to authenticate users.
(True/False)
4.7/5
(33)
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.
(Multiple Choice)
4.8/5
(34)
List and briefly explain the 6 human safeguards for employees that help block security threats.
(Essay)
4.8/5
(39)
The most challenging aspect of security is businesses do not thoroughly test the security of their new systems before they are employed.
(True/False)
4.7/5
(43)
A/An _______________attack in which a malicious hacker floods a Web server with millions of bogus service requests that so occupy the server that it cannot service legitimate requests.
(Multiple Choice)
4.8/5
(39)
Safeguards are a type of control; and like all controls,they limit behavior.
(True/False)
4.8/5
(38)
A __________ uses software or a dedicated computer to create a private network over the public Internet.
(Multiple Choice)
4.8/5
(37)
___________are small files that your browser stores on your computer when you visit Web sites.
(Multiple Choice)
4.8/5
(38)
Information systems security is the process of preventing unauthorized access to an IS or modification of its data.
(True/False)
4.8/5
(37)
A public key is like the combination lock,and the private key is like the combination.
(True/False)
4.8/5
(42)
The single most important safeguard for computer security is to create and use strong passwords.
(True/False)
4.8/5
(43)
To be effective,information security must address unavoidable trade-offs.Describe two of these trade-offs.
(Essay)
4.8/5
(49)
The user name identifies the user and the password authenticates that user.
(True/False)
4.8/5
(48)
Reducing risk always costs,and the elimination of all risk would be exceptionally
expensive if not impossible.
(True/False)
4.9/5
(36)
Showing 101 - 117 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)