Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-to-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media100 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems90 Questions
Exam 8: Strengthening Business-to-Business Relationships via Supply Chain and Customer Relationship100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Foundations of Information Systems Infrastructure124 Questions
Select questions type
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.
(Multiple Choice)
4.9/5
(39)
Which of the following US laws amended the Computer Fraud and Abuse Act to allow investigators access to voice-related communications?
(Multiple Choice)
4.9/5
(35)
Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison.Such violations are charged as ________.
(Multiple Choice)
4.7/5
(33)
An organization builds a fully equipped backup facility,having everything from office chairs to a one-to-one replication of the most current data.This facility is called a ________.
(Multiple Choice)
4.9/5
(32)
Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization.
(Multiple Choice)
4.8/5
(38)
While Shelly downloaded an arcade game from an unknown Internet Web site,an unauthorized connection unknown to Shelly had been established with her computer.The arcade game is most likely to be ________.
(Multiple Choice)
4.8/5
(37)
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
(Multiple Choice)
4.8/5
(35)
Those individuals who are knowledgeable enough to gain access to computer systems without authorization have long been referred to as ________.
(Multiple Choice)
4.8/5
(29)
List the six commonly used methods in which technology is employed to safeguard information systems.
(Essay)
5.0/5
(32)
An Internet hoax is a false message circulated online about new viruses.
(True/False)
4.7/5
(27)
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse or fraud,controls to detect any potential problems,and effective measures to correct any problems?
(Multiple Choice)
5.0/5
(34)
Today,people who break into computer systems with the intention of doing damage or committing a crime are usually called ________.
(Multiple Choice)
4.8/5
(45)
________ broadly refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.
(Multiple Choice)
4.9/5
(35)
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur.This approach is called ________.
(Multiple Choice)
4.8/5
(32)
________ software is used to keep track of computer activity so that inspectors can spot suspicious activity and take action.
(Multiple Choice)
4.8/5
(35)
The ________ is a set of best practices that helps organizations both maximize the benefits from their IS infrastructure and establish appropriate controls.
(Multiple Choice)
4.8/5
(38)
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power,backups,connectivity,and security.Such data centers are called ________.
(Multiple Choice)
4.8/5
(37)
In May 2001,an e-mail with "This is unbelievable!" in the subject field and an attached file spread to numerous computers in the world.Any user who downloaded the attached file complained of his or her systems slowing down and in some cases,files being erased.The attached file is most likely to be ________.
(Multiple Choice)
4.7/5
(39)
Showing 61 - 80 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)