Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
(True/False)
4.8/5
(32)
A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
(True/False)
4.7/5
(43)
What scrambles information into an alternative form that requires a key or password to decrypt?
(Multiple Choice)
5.0/5
(36)
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
(Multiple Choice)
4.9/5
(38)
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processeD.
(True/False)
4.8/5
(41)
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?
(Multiple Choice)
4.8/5
(36)
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
(True/False)
4.8/5
(36)
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reasons on personal networks are two areas that should be addressed by managers in which of the following company policies?
(Multiple Choice)
4.7/5
(37)
Organizations address security risks through two lines of defense.The first is people and the second is technology.
(True/False)
4.7/5
(37)
Which of the following is the main drawback of biometrics?
(Multiple Choice)
4.9/5
(24)
Which of the choices below represents the definition of information management?
(Multiple Choice)
4.9/5
(37)
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
(True/False)
4.8/5
(33)
Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
(True/False)
4.8/5
(32)
What refers to choosing to allow permissions to incoming emails?
(Multiple Choice)
4.9/5
(41)
Which of the choices below represents the definition of information secrecy?
(Multiple Choice)
4.8/5
(31)
Showing 181 - 200 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)