Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
Why is software quality important to security? What specific steps can an organization take to ensure software quality?
(Essay)
4.9/5
(34)
Smartphones have the same security flaws as other Internet-connected devices.
(True/False)
4.9/5
(49)
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
(Multiple Choice)
4.9/5
(44)
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
(True/False)
4.9/5
(32)
All of the following are types of information systems general controls except:
(Multiple Choice)
4.9/5
(35)
An independent computer program that copies itself from one computer to another over a network is called a:
(Multiple Choice)
4.8/5
(40)
Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?
(Multiple Choice)
4.8/5
(48)
Which of the following is not an example of a computer used as an instrument of crime?
(Multiple Choice)
5.0/5
(44)
According to Ponemon Institute's 2014 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:
(Multiple Choice)
4.8/5
(38)
Which of the following statements about botnets is not true?
(Multiple Choice)
4.9/5
(35)
Which of the following statements about Internet security is not true?
(Multiple Choice)
4.8/5
(37)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.9/5
(42)
Specific security challenges that threaten the communications lines in a client/server environment include:
(Multiple Choice)
4.9/5
(36)
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
(Multiple Choice)
4.8/5
(36)
Authorization refers to the ability to know that a person is who he or she claims to be.
(True/False)
4.7/5
(43)
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
(True/False)
4.9/5
(27)
Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?
(Essay)
4.9/5
(35)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)