Exam 10: Information Systems Security
Exam 1: The Importance of Mis100 Questions
Exam 2: Collaboration Information Systems99 Questions
Exam 3: Strategy and Information Systems100 Questions
Exam 4: Hardware, Software, and Mobile Systems100 Questions
Exam 5: Database Processing103 Questions
Exam 6: The Cloud100 Questions
Exam 7: Processes, Organizations, and Information Systems100 Questions
Exam 8: Social Media Information Systems100 Questions
Exam 9: Business Intelligence Systems100 Questions
Exam 10: Information Systems Security100 Questions
Exam 11: Information Systems Management100 Questions
Exam 12: Information Systems Development100 Questions
Select questions type
Which of the following statements is true about data administration?
(Multiple Choice)
4.7/5
(40)
Technical safeguards involve the hardware and software components of an information system.
(True/False)
5.0/5
(31)
Sarah was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Sarah's system is ________.
(Multiple Choice)
4.8/5
(34)
________ present(s)the largest risk for an organization's infrastructure loss.
(Multiple Choice)
4.8/5
(45)
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications.
(Multiple Choice)
4.8/5
(31)
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.
(Multiple Choice)
4.9/5
(33)
Which of the following is most likely to be a result of hacking?
(Multiple Choice)
4.7/5
(34)
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.
(Multiple Choice)
4.9/5
(41)
Secure Sockets Layer (SSL)is a protocol that is restricted to asymmetric encryption.
(True/False)
4.8/5
(40)
Most spyware programs are benign in that they do not perform malicious acts or steal data.
(True/False)
4.7/5
(30)
Discuss some human safeguards for employees that can ensure the security of information systems.
(Essay)
4.9/5
(34)
In information security, which of the following is true about managing risk?
(Multiple Choice)
4.7/5
(45)
Which of the following statements is true about losses due to computer security threats?
(Multiple Choice)
4.7/5
(38)
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
(True/False)
4.9/5
(37)
A computer crime is committed if an employee inadvertently installs an old database on top of the current one.
(True/False)
4.7/5
(39)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)