Exam 10: Information Systems Security
Exam 1: The Importance of Mis100 Questions
Exam 2: Collaboration Information Systems99 Questions
Exam 3: Strategy and Information Systems100 Questions
Exam 4: Hardware, Software, and Mobile Systems100 Questions
Exam 5: Database Processing103 Questions
Exam 6: The Cloud100 Questions
Exam 7: Processes, Organizations, and Information Systems100 Questions
Exam 8: Social Media Information Systems100 Questions
Exam 9: Business Intelligence Systems100 Questions
Exam 10: Information Systems Security100 Questions
Exam 11: Information Systems Management100 Questions
Exam 12: Information Systems Development100 Questions
Select questions type
Kenneth is working on a confidential government project. Daniel, a coworker, and he are the only two members who are authorized to access the project's information system. Kenneth, while away on a business trip, receives an email from Daniel asking for his login credentials as Daniel was unable to access the system. Kenneth finds the request unusual, and calls Daniel to confirm if the email was sent by him. Kenneth deletes the email when he learns that Daniel had not sent it. This scenario is an example of attempted ________.
(Multiple Choice)
4.9/5
(43)
Which of the following statements is true about human safeguards for employees?
(Multiple Choice)
4.9/5
(42)
Natural disasters present the largest risk for infrastructure loss.
(True/False)
4.8/5
(46)
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
(Multiple Choice)
4.9/5
(33)
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
(Multiple Choice)
4.9/5
(39)
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
(Multiple Choice)
4.9/5
(34)
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
(Multiple Choice)
4.8/5
(30)
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL)protocol?
(Multiple Choice)
4.8/5
(36)
Kate was among the top ten applicants for an honorary scholarship at her university. The scholarship would be decided by a written exam and an interview. Kate had outperformed the others in the interview, but she was not sure of her written exam's results. She illegally accessed the system where the final results were stored and changed her grades before the results were sent out to the scholarship committee. Kate's act can be termed as ________.
(Multiple Choice)
4.9/5
(29)
________ are viruses that masquerade as useful programs or files.
(Multiple Choice)
5.0/5
(34)
________ is a broad category of software that includes viruses, spyware, and adware.
(Multiple Choice)
4.9/5
(30)
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
(Multiple Choice)
4.9/5
(32)
Biometric authentication uses physical characteristics such as retinal scans to authenticate users.
(True/False)
4.7/5
(36)
A Trojan horse is a virus that masquerades as a useful program or file.
(True/False)
4.9/5
(34)
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
(Multiple Choice)
4.7/5
(40)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)