Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
All of the following have contributed to an increase in software flaws except:
Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
E
________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
B
A foreign country attempting to access government networks in order to disable a national power grid is an example of:
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
(Essay)
4.8/5
(39)
Why is software quality important to security? What specific steps can an organization take to ensure software quality?
(Essay)
4.8/5
(41)
Fault tolerant information systems offer 100 percent availability because they use:
(Multiple Choice)
4.9/5
(42)
WPA2 is a more effective way to secure a wireless network than WEP because it:
(Multiple Choice)
4.8/5
(34)
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
(Multiple Choice)
4.7/5
(43)
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
(Essay)
4.7/5
(35)
Which of the following statements about botnets is not true?
(Multiple Choice)
4.8/5
(36)
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
(Multiple Choice)
4.8/5
(39)
In cloud computing, accountability and responsibility for protection of sensitive data is transferred to the cloud provider.
(True/False)
4.9/5
(42)
Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.
(True/False)
4.9/5
(41)
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
(True/False)
4.9/5
(39)
Organizations can use existing network security software to secure mobile devices.
(True/False)
4.8/5
(40)
________ is spyware that logs and transmits everything a user types.
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)