Exam 8: Securing Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
As described in the chapter case, which of the following did hackers use to gain access to the DNC network?
(Multiple Choice)
4.9/5
(42)
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
(Multiple Choice)
4.8/5
(31)
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
(Multiple Choice)
4.9/5
(33)
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
(Multiple Choice)
4.7/5
(37)
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
(Multiple Choice)
4.9/5
(41)
All of the following are specific security challenges that threaten the communications lines in a client/server environment except:
(Multiple Choice)
4.9/5
(37)
Which of the following statements about passwords is not true?
(Multiple Choice)
4.7/5
(38)
According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately:
(Multiple Choice)
4.7/5
(42)
Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall?
(Multiple Choice)
4.8/5
(47)
Which of the following statements about Internet security is not true?
(Multiple Choice)
4.9/5
(37)
Define computer forensics and describe the types of problems it is designed to address.
(Essay)
4.7/5
(38)
All of the following are types of information systems general controls except:
(Multiple Choice)
5.0/5
(40)
Is the cloud a safer and more secure computing environment than an in-house network? Why or why not?
(Essay)
4.8/5
(37)
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
(Multiple Choice)
4.9/5
(36)
When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:
(Multiple Choice)
4.9/5
(34)
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
(Multiple Choice)
4.8/5
(47)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)