Exam 12: Information Security Management
Exam 1: The Importance of Mis80 Questions
Exam 2: Business Processes, Information Systems and Information89 Questions
Exam 3: Organisational Strategy, Information Systems and Competitive Advantage96 Questions
Exam 4: Hardware and Software80 Questions
Exam 5: Database Processing80 Questions
Exam 6: The Cloud74 Questions
Exam 7: Organisations and Information Systems84 Questions
Exam 8: Social Media Information Systems91 Questions
Exam 9: Business Intelligence Systems92 Questions
Exam 10: Information Systems Development80 Questions
Exam 11: Information Systems Management80 Questions
Exam 12: Information Security Management93 Questions
Exam 13: Collaboration Information Systems for Decision Making, Problem Solving and Project Management46 Questions
Exam 14: Collaboration Information Systems for Student Projects53 Questions
Exam 15: Mobile Systems50 Questions
Exam 16: Introduction to Microsoft Excel 201348 Questions
Exam 17: Database Design44 Questions
Exam 18: Using Microsoft Access 201348 Questions
Exam 19: Using Excel and Access Together50 Questions
Exam 20: Network and Cloud Technology62 Questions
Exam 21: Enterprise Resource Planning Erp Systems50 Questions
Exam 22: Supply Chain Management40 Questions
Exam 23: Hyper-Social Organisations and Knowledge Management40 Questions
Exam 24: Database Marketing40 Questions
Exam 25: Reporting Systems and Olap44 Questions
Exam 26: Systems Development Project Management44 Questions
Exam 27: Agile Development44 Questions
Exam 28: Business Process Management40 Questions
Exam 29: International Mis40 Questions
Select questions type
A ________ has a microchip that is loaded with identifying data.
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
A
Organisations should protect sensitive data by storing it in ________ form.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
A
In a brute force attack,a password cracker tries every possible combination of characters.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
While making online purchases,a person should buy only from vendors who support https.
(True/False)
4.8/5
(29)
Explain the concept of denial of service (DOS)in information management.
(Essay)
4.8/5
(24)
What are the three interdependent factors involved in the enforcement of security policies and procedures in an organisation?
(Essay)
4.8/5
(36)
Adware and spyware are similar to each other in that they both ________.
(Multiple Choice)
4.9/5
(33)
Which of the following uses an individual's personal physical characteristics such as fingerprints,facial features,and retinal scans for verification purposes?
(Multiple Choice)
4.8/5
(32)
Explain the two critical security functions that an organisation's senior management needs to address.
(Essay)
4.9/5
(32)
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorised ones.
(Multiple Choice)
4.9/5
(36)
________ are small files that browsers store on users' computers when they visit Web sites.
(Multiple Choice)
4.8/5
(27)
With HTTPS,data are encrypted using a protocol called the ________.
(Multiple Choice)
4.7/5
(42)
Breaking into computers,servers,or networks to steal proprietary and confidential data is referred to as ________.
(Multiple Choice)
4.8/5
(35)
Activity log analyses constitute an important ________ function.
(Multiple Choice)
4.8/5
(23)
The existence of accounts that are no longer necessary do not pose any security threats.
(True/False)
4.8/5
(37)
Risk management is a critical security function of an organisation's senior management.
(True/False)
4.8/5
(32)
Backup and physical security are ________ against computer security threats.
(Multiple Choice)
4.9/5
(35)
A(n)________ is a sophisticated,possibly long-running,computer hack that is perpetrated by large,well-funded organisations like governments.
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)