Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
Which of the following sued BJ's Wholesale Club for allowing hackers to access its systems and steal credit and debit card data for fraudulent purchases?
(Multiple Choice)
5.0/5
(41)
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
(Multiple Choice)
4.8/5
(39)
All of the following have contributed to an increase in software flaws except:
(Multiple Choice)
4.7/5
(29)
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(True/False)
4.8/5
(42)
Wireless networks are more difficult to penetrate because radio frequency bands are hard to scan.
(True/False)
4.7/5
(38)
Which of the following is not an example of a computer used as a target of crime?
(Multiple Choice)
4.8/5
(35)
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
(Essay)
4.9/5
(28)
Which of the following statements about passwords is not true?
(Multiple Choice)
4.9/5
(31)
A walkthrough is a type of software testing used before software is even written.
(True/False)
4.9/5
(41)
You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.
(Essay)
4.9/5
(33)
According to the 2015 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2014?
(Multiple Choice)
4.7/5
(34)
Specific security challenges that threaten clients in a client/server environment include:
(Multiple Choice)
5.0/5
(38)
Which of the following is the single greatest cause of network security breaches?
(Multiple Choice)
4.8/5
(35)
All of the following are currently being used as traits that can be profiled by biometric authentication except:
(Multiple Choice)
4.9/5
(45)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)