Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
The intentional defacement or destruction of a website is called:
(Multiple Choice)
4.9/5
(35)
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
(Multiple Choice)
4.8/5
(39)
How does disaster recovery planning differ from business continuity planning?
(Essay)
4.8/5
(38)
SSL is a protocol used to establish a secure connection between two computers.
(True/False)
4.8/5
(33)
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:
(Multiple Choice)
4.9/5
(49)
Which of the following focuses primarily on the technical issues of keeping systems up and running?
(Multiple Choice)
4.9/5
(43)
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
(Essay)
4.9/5
(36)
A statement ranking information risks and identifying security goals would be included in which of the following?
(Multiple Choice)
4.8/5
(37)
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
(Multiple Choice)
4.8/5
(33)
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
(True/False)
4.9/5
(31)
DoS attacks are used to destroy information and access restricted areas of a company's information system.
(True/False)
4.7/5
(37)
Smartphones have the same security flaws as other Internet-connected devices.
(True/False)
4.8/5
(43)
Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.
(True/False)
4.9/5
(37)
You have just been hired as a security consultant by MegaMalls Inc., a chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.
(Essay)
4.9/5
(39)
As described in the chapter case, losing smartphones is a rare cause of data breaches.
(True/False)
4.8/5
(35)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)