Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-to-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media100 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems90 Questions
Exam 8: Strengthening Business-to-Business Relationships via Supply Chain and Customer Relationship100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Foundations of Information Systems Infrastructure124 Questions
Select questions type
Which of the following is the most complete definition of a computer crime?
(Multiple Choice)
4.9/5
(45)
Spam filters are used to reduce the amount of spam processed by central e-mail servers.
(True/False)
4.8/5
(39)
________ is a process in which you assess the value of the assets being protected,determine their probability of being compromised,and compare the probable costs of their being compromised with the estimated costs of whatever protections you might have to take.
(Multiple Choice)
4.8/5
(32)
While adding information to the employee information database,Neil's computer crashed and the entire database on his computer was erased along with it.Which of the following types of virus would have caused Neil's computer to crash?
(Multiple Choice)
4.8/5
(35)
Data mining refers to the use of Web sites to disseminate propaganda to current and potential supporters,to influence international public opinion,and to notify potential enemies of pending plans.
(True/False)
5.0/5
(31)
An organization takes active countermeasures to protect its systems,such as installing firewalls.This approach is known as ________.
(Multiple Choice)
4.8/5
(28)
Which of the following types of plans describes how a business resumes operation after a disaster?
(Multiple Choice)
4.9/5
(27)
A honeypot is a computer,data,or network site that is used to penetrate other networks and computer systems to snoop or to cause damage.
(True/False)
5.0/5
(40)
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person,company,or organization most likely to want it.
(Multiple Choice)
4.8/5
(40)
Which of the following is a message passed to a Web browser on a user's computer by a Web server?
(Multiple Choice)
4.8/5
(38)
Which of the following terms refers to a computer,data,or network site that is designed to be enticing to crackers so as to detect,deflect,or counteract illegal activity?
(Multiple Choice)
4.8/5
(37)
Which of the following is the most accurate definition of a botnet?
(Multiple Choice)
4.8/5
(30)
A(n)________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.
(Multiple Choice)
4.8/5
(32)
Arbitron consultants,a leading software consulting firm in the United States,decides to launch an ERP solution.The company chooses the brand name ArbitEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that the domain name is already registered to an unknown firm.The small firm is now attempting to sell the domain name to Arbitron.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
(Multiple Choice)
5.0/5
(32)
________ is the use of formal investigative techniques to evaluate digital information for judicial review.
(Multiple Choice)
4.8/5
(38)
Which of the following can typically be filed for a copyright?
(Multiple Choice)
4.8/5
(28)
Computers that are located in homes,schools,and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.
(Multiple Choice)
4.9/5
(41)
________ refers to offering stolen proprietary software for free over the Internet.
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)