Exam 10: Securing Information Systems
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-to-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media100 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems90 Questions
Exam 8: Strengthening Business-to-Business Relationships via Supply Chain and Customer Relationship100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Foundations of Information Systems Infrastructure124 Questions
Select questions type
Logic bombs are variations of Trojan horses that can reproduce themselves to disrupt the normal functioning of a computer.
(True/False)
4.8/5
(39)
RBS Publishing is a leading media company in France.The company handles sensitive information and often finds it susceptible to information threats.As a counter measure the company installs strong firewalls and protective software.These steps are a part of a ________ strategy.
(Multiple Choice)
4.7/5
(35)
What is risk analysis? What are the three ways in which organizations react to perceived risks?
(Essay)
4.9/5
(32)
What is unauthorized access? Provide a few examples of unauthorized access.
(Essay)
4.8/5
(37)
A hacker takes an individual's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to run up debts that are never repaid.This practice is called ________.
(Multiple Choice)
4.9/5
(38)
In ________,an attacker accesses the network,intercepts data from it,and even uses network services and/or sends attack instructions to it without having to enter the home,office,or organization that owns the network.
(Multiple Choice)
4.9/5
(32)
Patriot hackers are independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies.
(True/False)
4.7/5
(38)
________ targeted at networks,is designed to spread by itself,without the need for an infected host file to be shared.
(Multiple Choice)
4.9/5
(40)
A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.
(True/False)
4.9/5
(37)
The Computer Fraud and Abuse Act of 1986 prohibits ________.
(Multiple Choice)
4.9/5
(25)
Ronald downloads a movie from the Internet onto his company's computer.During this process,his system gets affected by a virus.The virus spreads rapidly in the company's network and causes the server to crash.This type of virus is most likely to be ________.
(Multiple Choice)
5.0/5
(30)
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.
(Multiple Choice)
4.9/5
(36)
________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.
(Multiple Choice)
4.8/5
(39)
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.
(Multiple Choice)
4.8/5
(36)
Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls.This process is called ________.
(Multiple Choice)
4.8/5
(31)
Which of the following is a valid observation about encryption?
(Multiple Choice)
4.9/5
(44)
Recovery point objectives of a recovery plan specify ________.
(Multiple Choice)
4.8/5
(38)
Violating data belonging to banks or other financial institutions is a crime in the United States.Which of the following legislations prohibit such violations?
(Multiple Choice)
4.8/5
(34)
Employees steal time on company computers to do personal business.This is a form of unauthorized access.
(True/False)
4.9/5
(40)
A cookie is a message passed to a Web browser on a user's computer by a Web server.
(True/False)
4.8/5
(34)
Showing 81 - 100 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)