Exam 26: Information Security
Exam 1: Business Driven Technology78 Questions
Exam 2: Identifying Competitive Advantages114 Questions
Exam 3: Strategic Initiatives for Implementing Competitive Advantages53 Questions
Exam 4: Measuring the Success of Strategic Initiatives44 Questions
Exam 5: Organizational Structures That Support Strategic Initiatives34 Questions
Exam 6: Valuing Organizational Information36 Questions
Exam 7: Storing Organizational Information-Databases45 Questions
Exam 8: Accessing Organizational Information-Data Warehouse46 Questions
Exam 9: Enabling the Organization-Decision Making39 Questions
Exam 10: Extending the Organization-Supply Chain Management19 Questions
Exam 11: Building a Customer-Centric Organization-Customer Relationship Management19 Questions
Exam 12: Integrating the Organization From End to End-Enterprise Resource Planning21 Questions
Exam 13: Creating Innovative Organizations87 Questions
Exam 14: Ebusiness81 Questions
Exam 15: Creating Collaborative Partnerships108 Questions
Exam 16: Integrating Wireless Technology in Business11 Questions
Exam 17: Developing Software to Streamline Operations31 Questions
Exam 18: Methodologies for Supporting Agile Organizations29 Questions
Exam 19: Managing Organizational Projects38 Questions
Exam 20: Developing a 21st-Century Organization26 Questions
Exam 21: Business Basics53 Questions
Exam 22: Business Process30 Questions
Exam 23: Hardware and Software Basics36 Questions
Exam 24: Mis Infrastructures38 Questions
Exam 25: Networks and Telecommunications49 Questions
Exam 26: Information Security76 Questions
Exam 27: Ethics68 Questions
Exam 28: Operations Management49 Questions
Exam 29: Sustainable Mis Infrastructures16 Questions
Exam 30: Business Intelligence32 Questions
Exam 31: Global Information Systems69 Questions
Exam 32: Global Trends62 Questions
Select questions type
Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.
(Short Answer)
4.8/5
(42)
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
(Multiple Choice)
4.8/5
(33)
_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
(Short Answer)
4.8/5
(43)
What floods a website with so many requests for service that it slows down or crashes the site?
(Multiple Choice)
4.7/5
(37)
Which of the following is not one of the five steps for creating an information security plan?
(Multiple Choice)
4.8/5
(28)
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
(Short Answer)
4.8/5
(36)
The most common type of defense within detection and response technologies is _________ software.
(Short Answer)
4.8/5
(33)
___________ attack computer systems by transmitting a virus hoax,with a real virus attached.
(Short Answer)
4.9/5
(29)
What identifies the rules required to maintain information security?
(Multiple Choice)
4.8/5
(38)
___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
(Short Answer)
4.7/5
(34)
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
(Multiple Choice)
4.9/5
(33)
A(n)_________ is software written with malicious intent to cause annoyance or damage.
(Short Answer)
4.8/5
(33)
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
(Short Answer)
4.7/5
(38)
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
(Short Answer)
4.9/5
(36)
Who breaks into other people's computer systems and just looks around or steals and destroys information?
(Multiple Choice)
4.9/5
(40)
Describe the relationships and differences between hackers and viruses.
(Essay)
4.7/5
(32)
Showing 21 - 40 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)