Exam 10: Information Systems Security
Exam 1: The Importance of Mis80 Questions
Exam 2: Business Processes, Information Systems, and Information89 Questions
Exam 3: Organizational Strategy, Information Systems96 Questions
Exam 4: Hardware and Software80 Questions
Exam 5: Database Processing80 Questions
Exam 6: The Cloud74 Questions
Exam 7: Organizations and Information Systems84 Questions
Exam 8: Social Media Information Systems91 Questions
Exam 9: Business Intelligence Systems92 Questions
Exam 10: Information Systems Security93 Questions
Exam 11: Information Systems Management80 Questions
Exam 12: Information Systems Development80 Questions
Exam 13: Collaboration Information Systems for Decision Making46 Questions
Exam 14: Collaborative Information Systems for Student Projects53 Questions
Exam 15: Mobile Systems50 Questions
Exam 16: Introduction to Microsoft Excel 201348 Questions
Exam 17: Database Design44 Questions
Exam 18: Using Microsoft Access 201348 Questions
Exam 19: Using Excel and Access Together50 Questions
Exam 20: Network and Cloud Technology63 Questions
Exam 21: Enterprise Resource Planning Erpsystems50 Questions
Exam 22: Supply Chain Management40 Questions
Exam 23: Enterprise Social Networks and Knowledge Management40 Questions
Exam 24: Database Marketing40 Questions
Exam 25: Reporting Systems and Olap44 Questions
Exam 26: Data Breaches50 Questions
Exam 27: International Mis41 Questions
Exam 28: Systems Development Project Management44 Questions
Exam 29: Agile Development44 Questions
Exam 30: Business Process Management40 Questions
Select questions type
With asymmetric encryption, two different keys are used for encoding and decoding a message.
(True/False)
4.9/5
(41)
Which of the following types of encryption is used by the secure sockets layer protocol?
(Multiple Choice)
4.8/5
(37)
Pretexting occurs when someone deceives by pretending to be someone else.
(True/False)
4.8/5
(31)
In an organization, security sensitivity for each position should be documented.
(True/False)
4.7/5
(38)
What human safeguards should be taken against security threats for temporary personnel, vendors, and partner personnel?
(Essay)
4.8/5
(35)
Which of the following statements is true of the financial losses due to computer crimes?
(Multiple Choice)
4.8/5
(34)
A user name authenticates a user, and a password identifies that user.
(True/False)
4.8/5
(29)
The creation of backup copies of database contents makes the data more vulnerable to security threats.
(True/False)
4.8/5
(45)
________ are created by companies as false targets for computer criminals to attack.
(Multiple Choice)
4.9/5
(37)
Mark receives an email from his bank asking him to update and verify his credit card details.He replies to the email with all the requested details.Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused.Mark is a victim of ________.
(Multiple Choice)
4.8/5
(37)
________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.
(Multiple Choice)
4.9/5
(34)
Wardrivers are those who engage in phishing to obtain unauthorized access to data.
(True/False)
4.8/5
(35)
Thomas is responsible for creating backup copies of information in a system.He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist.Thomas is involved in establishing ________.
(Multiple Choice)
4.7/5
(36)
Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.
(True/False)
4.9/5
(31)
Packet-filtering firewalls are the most sophisticated type of firewall.
(True/False)
4.8/5
(34)
Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors.
(True/False)
4.8/5
(26)
Spyware programs are installed on a user's computer without the user's knowledge.
(True/False)
4.8/5
(39)
Showing 21 - 40 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)