Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?
(Multiple Choice)
4.8/5
(37)
What is one of the guidelines an organization can follow when creating an information privacy policy?
(Multiple Choice)
4.9/5
(38)
Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?
(Multiple Choice)
4.8/5
(36)
Which of the choices below represents the definition of information compliance?
(Multiple Choice)
4.8/5
(36)
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
(True/False)
4.8/5
(48)
Which of the following is not an example of unplanned downtime?
(Multiple Choice)
5.0/5
(37)
A worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spreaD.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
(True/False)
4.8/5
(41)
Which of the following is one of the four basic options included in a bring your own device policy?
(Multiple Choice)
4.8/5
(38)
Which of the following definitions represents typosquatting?
(Multiple Choice)
4.9/5
(43)
What area of information security focuses on preventing identity theft, phishing, and pharming scams?
(Multiple Choice)
4.8/5
(37)
How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?
(Multiple Choice)
4.9/5
(45)
What is a group of computers on which a hacker has planted zombie programs?
(Multiple Choice)
4.7/5
(44)
What is the difference between pirated and counterfeit software?
(Multiple Choice)
4.8/5
(40)
Which of the following refers to a period of time when a system is unavailable?
(Multiple Choice)
5.0/5
(49)
Which of the following clauses is typically contained in an acceptable use policy?
(Multiple Choice)
4.8/5
(35)
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
(True/False)
4.9/5
(43)
Which of the following represents the classic example of unintentional information reuse?
(Multiple Choice)
4.9/5
(37)
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
(Multiple Choice)
4.7/5
(40)
Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)