Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
What scrambles information into an alternative form that requires a key or password to decrypt?
(Multiple Choice)
4.8/5
(37)
Which of the following is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?
(Multiple Choice)
4.8/5
(46)
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
(Multiple Choice)
4.9/5
(39)
In relation to privacy,which of the following is the assurance that messages and information remain available only to those authorized to view them?
(Multiple Choice)
4.8/5
(36)
With so much information and moving parts within a company,technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures as keystrokes,error rate,and number of transaction processed?
(Multiple Choice)
4.8/5
(35)
Which of the following authentication methods is 100 percent accurate?
(Multiple Choice)
4.7/5
(35)
The most secure procedures combine which of the following authentication and authorization techniques?
(Multiple Choice)
4.7/5
(30)
Included in the information security policy,managers should consider including virus protection,which includes how often the system should be scanned and how frequently the software should be __________.
(Short Answer)
4.9/5
(27)
What is a process by which a user misleads a system into granting unauthorized rights,usually for the purpose of compromising or destroying the system?
(Multiple Choice)
4.9/5
(41)
Which of the following represents the two fundamental building blocks that protect organizational information?
(Multiple Choice)
4.8/5
(37)
Crackers,cyberterrorists,hactivists,and script bunnies are all types of __________.
(Short Answer)
4.7/5
(32)
Identity theft is the forging of someone's identity for the purpose of fraud.
(True/False)
4.8/5
(37)
A DDoS stands for one of the common forms of viruses,that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?
(Multiple Choice)
4.9/5
(35)
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames,passwords,personal information,and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?
(Multiple Choice)
4.9/5
(40)
__________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
(Short Answer)
4.8/5
(42)
Showing 301 - 320 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)