Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
(Multiple Choice)
4.8/5
(37)
Describe the relationships and differences between hackers and viruses.
(Essay)
4.9/5
(38)
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
(Multiple Choice)
4.9/5
(36)
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
(True/False)
4.9/5
(32)
Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
(Multiple Choice)
4.9/5
(41)
A worm spreads itself not only from file to file but also from computer to computer.
(True/False)
4.7/5
(33)
Which of the following represents the biggest problem of information security breaches?
(Multiple Choice)
4.9/5
(31)
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
(Multiple Choice)
4.9/5
(40)
Which of the following authentication methods is 100 percent accurate?
(Multiple Choice)
4.8/5
(38)
Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
(Multiple Choice)
4.8/5
(45)
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
(Multiple Choice)
4.9/5
(40)
What is a masquerading attack that combines spam with spoofing?
(Multiple Choice)
4.8/5
(34)
Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
(True/False)
4.9/5
(37)
An ethical computer use policy contains general principles to guide computer user behavior.
(True/False)
4.8/5
(30)
Which of the following is not considered a form of biometrics?
(Multiple Choice)
4.9/5
(41)
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
(True/False)
4.7/5
(41)
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
(True/False)
4.8/5
(36)
Showing 61 - 80 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)