Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software and can act as ________.
(Multiple Choice)
4.9/5
(32)
Multifactor authentication is the traditional security process, which requires a user name and passworD.
(True/False)
4.8/5
(44)
What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
(Multiple Choice)
4.9/5
(41)
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.
(True/False)
4.8/5
(35)
What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?
(Multiple Choice)
5.0/5
(34)
Which of the choices below represents the definition of information compliance?
(Multiple Choice)
4.7/5
(39)
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
(Multiple Choice)
4.8/5
(44)
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
(True/False)
4.8/5
(33)
What outlines the corporate guidelines or principles governing employee online communications?
(Multiple Choice)
4.9/5
(42)
What includes a variety of threats such as viruses, worms, and Trojan horses?
(Multiple Choice)
4.9/5
(39)
A zombie farm is a group of computers on which a hacker has planted zombie programs.
(True/False)
4.8/5
(36)
A user can opt out of receiving emails by choosing to deny permission to incoming emails.
(True/False)
4.8/5
(36)
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
(True/False)
4.9/5
(40)
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
(Multiple Choice)
4.8/5
(28)
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
(True/False)
4.7/5
(34)
Backdoor programs open a way into the network for future attacks.
(True/False)
4.8/5
(31)
Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
(True/False)
4.8/5
(32)
Ransomware is a form of malicious software that infects your computer and asks for money.
(True/False)
4.8/5
(37)
Showing 201 - 220 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)