Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
Which of the below represents the biggest problem of information security breaches?
(Multiple Choice)
4.9/5
(39)
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
(True/False)
4.7/5
(41)
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
(Short Answer)
4.8/5
(34)
Which of the following is an example of a way to maintain information security that a company should include in their information security policies?
(Multiple Choice)
4.9/5
(32)
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
(True/False)
4.8/5
(36)
A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.
(True/False)
4.9/5
(35)
Website name _________ is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
(Short Answer)
4.8/5
(35)
What is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner?
(Multiple Choice)
4.7/5
(36)
There are two means of stealing an identity,____________ reroutes requests for legitimate websites to false websites.
(Short Answer)
4.9/5
(34)
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
(Multiple Choice)
4.9/5
(46)
Which quadrant in the cost of downtime includes equipment rental,overtime costs,and travel expenses?
(Multiple Choice)
4.8/5
(35)
Opt ________ of receiving emails by choosing to deny permission to incoming emails.
(Short Answer)
4.8/5
(43)
Which of the following contains general principles to guide computer user behavior?
(Multiple Choice)
4.8/5
(40)
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
(True/False)
4.7/5
(45)
All of the following are types of information security breaches except:
(Multiple Choice)
4.9/5
(32)
Which of the following is not an example of unplanned downtime?
(Multiple Choice)
4.8/5
(53)
The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
(Short Answer)
4.9/5
(33)
A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
(True/False)
4.9/5
(34)
Through social ____________,hackers use their social skills to trick people into revealing access credentials or other valuable information.
(Short Answer)
4.8/5
(42)
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
(True/False)
4.9/5
(36)
Showing 281 - 300 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)