Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-to-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media100 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems90 Questions
Exam 8: Strengthening Business-to-Business Relationships via Supply Chain and Customer Relationship100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Foundations of Information Systems Infrastructure124 Questions
Select questions type
Cyber criminals gain information on a victim by monitoring online activities,accessing databases,and so on and make false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites.Such acts are called ________.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
B
________ is the use of computer and networking technologies,by individuals and organized groups,against persons or property to intimidate or coerce governments,civilians,or any segment of society in order to attain political,religious,or ideological goals.
Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
A
Cyberwar refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
Ciscon Telecom is a mobile operator in the European Union.The company provides personalized services to its customers and its databases contain valuable information about its customers.The loss of customer information which is used to decide services would be extremely harmful to the organization.Which of the following strategies used by Ciscon is an example of risk transference?
(Multiple Choice)
4.8/5
(42)
A hot backup site is an empty warehouse with all necessary connections for power and communication.
(True/False)
4.9/5
(38)
Detective controls are used to prevent any potentially negative event from occurring,such as preventing outside intruders from accessing a facility.
(True/False)
4.9/5
(35)
Patents generally refer to creations of the mind such as music,literature,or software.
(True/False)
4.9/5
(38)
________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
(Multiple Choice)
4.7/5
(37)
A(n)________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
(Multiple Choice)
5.0/5
(37)
Controls that are used to assess whether anything went wrong,such as unauthorized access attempts,are called ________ controls.
(Multiple Choice)
4.7/5
(51)
Employees steal time on company computers to do personal business.This can be considered as an example of ________.
(Multiple Choice)
4.8/5
(41)
Which of the following is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network?
(Multiple Choice)
4.7/5
(42)
COBIT is a set of best practices that helps organizations maximize the benefits from their IS infrastructure and establish appropriate controls.
(True/False)
4.9/5
(32)
Which of the following is one of the main federal laws in the United States against computer crimes?
(Multiple Choice)
4.9/5
(36)
Which of the following terms represents junk newsgroup postings used for the purpose of advertising for some product or service?
(Multiple Choice)
4.9/5
(37)
Insuring all the systems and information processing processes is an essential part of risk acceptance strategy.
(True/False)
4.7/5
(26)
Showing 1 - 20 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)