Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
(Essay)
4.7/5
(36)
For 100 percent availability, online transaction processing requires:
(Multiple Choice)
4.9/5
(33)
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
(Multiple Choice)
4.9/5
(42)
All of the following countries are popular sources of malware attacks except:
(Multiple Choice)
4.9/5
(37)
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
(Multiple Choice)
4.9/5
(43)
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
(Multiple Choice)
4.9/5
(30)
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
(Multiple Choice)
4.9/5
(37)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.8/5
(43)
DoS attacks are used to destroy information and access restricted areas of a company's information system.
(True/False)
4.9/5
(40)
Which of the following focuses primarily on the technical issues of keeping systems up and running?
(Multiple Choice)
4.8/5
(35)
Computer forensics tasks include all of the following except:
(Multiple Choice)
4.9/5
(35)
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
(True/False)
4.8/5
(45)
Which of the following specifications replaced WEP with a stronger security standard that features changing encryption keys?
(Multiple Choice)
4.7/5
(28)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)