Exam 26: Information Security
Exam 1: Business Driven Technology78 Questions
Exam 2: Identifying Competitive Advantages114 Questions
Exam 3: Strategic Initiatives for Implementing Competitive Advantages53 Questions
Exam 4: Measuring the Success of Strategic Initiatives44 Questions
Exam 5: Organizational Structures That Support Strategic Initiatives34 Questions
Exam 6: Valuing Organizational Information36 Questions
Exam 7: Storing Organizational Information-Databases45 Questions
Exam 8: Accessing Organizational Information-Data Warehouse46 Questions
Exam 9: Enabling the Organization-Decision Making39 Questions
Exam 10: Extending the Organization-Supply Chain Management19 Questions
Exam 11: Building a Customer-Centric Organization-Customer Relationship Management19 Questions
Exam 12: Integrating the Organization From End to End-Enterprise Resource Planning21 Questions
Exam 13: Creating Innovative Organizations87 Questions
Exam 14: Ebusiness81 Questions
Exam 15: Creating Collaborative Partnerships108 Questions
Exam 16: Integrating Wireless Technology in Business11 Questions
Exam 17: Developing Software to Streamline Operations31 Questions
Exam 18: Methodologies for Supporting Agile Organizations29 Questions
Exam 19: Managing Organizational Projects38 Questions
Exam 20: Developing a 21st-Century Organization26 Questions
Exam 21: Business Basics53 Questions
Exam 22: Business Process30 Questions
Exam 23: Hardware and Software Basics36 Questions
Exam 24: Mis Infrastructures38 Questions
Exam 25: Networks and Telecommunications49 Questions
Exam 26: Information Security76 Questions
Exam 27: Ethics68 Questions
Exam 28: Operations Management49 Questions
Exam 29: Sustainable Mis Infrastructures16 Questions
Exam 30: Business Intelligence32 Questions
Exam 31: Global Information Systems69 Questions
Exam 32: Global Trends62 Questions
Select questions type
What is the most costly and intrusive form of authentication?
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
C
Tokens are small electronic devices that change user passwords __________.
Free
(Short Answer)
4.8/5
(28)
Correct Answer:
automatically
A(n)_______ is a program or device that can monitor data traveling over a network.
Free
(Short Answer)
4.8/5
(45)
Correct Answer:
sniffer
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
(Short Answer)
5.0/5
(35)
What includes a variety of threats such as viruses,worms,and Trojan horses?
(Multiple Choice)
4.9/5
(27)
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
(Short Answer)
4.9/5
(39)
A(n)information security ____________ details how an organization will implement the information security policies.
(Short Answer)
4.8/5
(35)
What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?
(Multiple Choice)
4.7/5
(36)
Tokens are small electronic devices that change user passwords automatically.
(True/False)
5.0/5
(28)
Which of the following authentication methods is 100 percent accurate?
(Multiple Choice)
4.8/5
(37)
Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
(Short Answer)
4.8/5
(45)
The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.
(Short Answer)
4.9/5
(38)
Develop the information security policies is the ________________ step for creating an information security plan.
(Short Answer)
4.8/5
(36)
_________ programs are viruses that open a way into the network for future attacks.
(Short Answer)
4.8/5
(42)
A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.
(Short Answer)
4.9/5
(32)
Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.
(Short Answer)
4.9/5
(32)
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
(Multiple Choice)
4.8/5
(41)
Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.
(Short Answer)
4.9/5
(40)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)