Exam 10: Information Systems Security
Exam 1: The Importance of Mis80 Questions
Exam 2: Business Processes, Information Systems, and Information89 Questions
Exam 3: Organizational Strategy, Information Systems96 Questions
Exam 4: Hardware and Software80 Questions
Exam 5: Database Processing80 Questions
Exam 6: The Cloud74 Questions
Exam 7: Organizations and Information Systems84 Questions
Exam 8: Social Media Information Systems91 Questions
Exam 9: Business Intelligence Systems92 Questions
Exam 10: Information Systems Security93 Questions
Exam 11: Information Systems Management80 Questions
Exam 12: Information Systems Development80 Questions
Exam 13: Collaboration Information Systems for Decision Making46 Questions
Exam 14: Collaborative Information Systems for Student Projects53 Questions
Exam 15: Mobile Systems50 Questions
Exam 16: Introduction to Microsoft Excel 201348 Questions
Exam 17: Database Design44 Questions
Exam 18: Using Microsoft Access 201348 Questions
Exam 19: Using Excel and Access Together50 Questions
Exam 20: Network and Cloud Technology63 Questions
Exam 21: Enterprise Resource Planning Erpsystems50 Questions
Exam 22: Supply Chain Management40 Questions
Exam 23: Enterprise Social Networks and Knowledge Management40 Questions
Exam 24: Database Marketing40 Questions
Exam 25: Reporting Systems and Olap44 Questions
Exam 26: Data Breaches50 Questions
Exam 27: International Mis41 Questions
Exam 28: Systems Development Project Management44 Questions
Exam 29: Agile Development44 Questions
Exam 30: Business Process Management40 Questions
Select questions type
Existence of accounts that are no longer necessary does not pose a security threat.
(True/False)
4.8/5
(45)
A(n)________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.
(Multiple Choice)
4.8/5
(42)
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.
(Multiple Choice)
4.9/5
(37)
Explain the concept of denial of service (DOS)in information management.
(Essay)
4.9/5
(39)
A ________ is a plastic card that has a microchip loaded with identifying data.
(Multiple Choice)
4.8/5
(41)
Explain how defining positions in an organization can safeguard against security threats.
(Essay)
4.9/5
(40)
IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site.
(True/False)
4.7/5
(32)
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?
(Multiple Choice)
4.9/5
(39)
What are the two critical security functions that an organization's senior management needs to address?
(Essay)
4.7/5
(42)
Incident-response plans should provide centralized reporting of all security incidents.
(True/False)
4.8/5
(36)
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
(Multiple Choice)
4.8/5
(30)
A key is a number used with an encryption algorithm to encrypt data.
(True/False)
4.9/5
(44)
A(n)________ is a computer program that senses when another computer is attempting to scan a disk or access a computer.
(Multiple Choice)
4.8/5
(34)
The loss of encryption keys by employees is referred to as key escrow.
(True/False)
4.9/5
(40)
Most secure communications over the Internet use a protocol called ________.
(Multiple Choice)
4.9/5
(41)
Which of the following is a human safeguard against security threats?
(Multiple Choice)
4.9/5
(42)
A help-desk information system has answers to questions that only a true user of an account or system would know.
(True/False)
4.7/5
(40)
Which of the following is a technical safeguard against security threats?
(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)