Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
Which of the following definitions represents Internet censorship?
(Multiple Choice)
4.8/5
(32)
The most secure procedures combine which of the following authentication and authorization techniques?
(Multiple Choice)
4.9/5
(36)
Cyberbullying is an act or object that poses a danger to assets.
(True/False)
4.9/5
(40)
Which of the following is considered a type of biometrics?
(Multiple Choice)
4.9/5
(37)
Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
(Essay)
5.0/5
(41)
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
(True/False)
4.8/5
(33)
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
(True/False)
4.8/5
(30)
What are the first two lines of defense a company should take when addressing security risks?
(Multiple Choice)
4.9/5
(31)
What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?
(Multiple Choice)
4.8/5
(34)
Different organizations and countries have their own terms for fair information practices.Which of the following is correct?
(Multiple Choice)
4.9/5
(31)
What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)?
(Multiple Choice)
4.8/5
(36)
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
(True/False)
4.8/5
(38)
Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
(True/False)
4.8/5
(40)
Which of the following represents the two fundamental building blocks that protect organizational information?
(Multiple Choice)
4.9/5
(34)
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
(True/False)
4.8/5
(39)
Showing 161 - 180 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)