Exam 5: IT Security, crime, compliance, and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security, crime, compliance, and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems72 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, ethics, and Social Responsibility73 Questions
Select questions type
Fraud management starts with corporate governance culture and ethics __________.
(Multiple Choice)
4.8/5
(36)
IT security is so integral to business objectives that it needs to be treated as a stand-alone function.
(True/False)
4.7/5
(35)
Network security involves three types of defenses,which are referred to as layers.Those layers consist of each of the following except:
(Multiple Choice)
4.8/5
(37)
Hackers involve unsuspecting insiders in their crimes using tactics called __________ that trick insiders into revealing access codes that outsiders should not have.
(Multiple Choice)
4.9/5
(44)
A __________ is a system,or group of systems,that enforces an access-control policy between two networks.
(Multiple Choice)
4.8/5
(42)
There has been a steep increase in malware because of the availability of free,easy to use,powerful toolkits that even novice cyber criminals can use to develop malware.
(True/False)
4.7/5
(32)
A(n)__________ is something or someone that may result in harm to an asset.
(Multiple Choice)
4.8/5
(35)
All Internet traffic,which travels as packets,should have to pass through a(n)__________ ,but that is rarely the case for instant messages and wireless traffic.
(Essay)
5.0/5
(36)
Which of the following is not a characteristic of IT security?
(Multiple Choice)
4.9/5
(37)
The major objective of __________ is proof of identity to identify the legitimate user and determine the action he or she is allowed to perform.
(Multiple Choice)
4.9/5
(34)
Sensitive data that are encrypted with wired equivalent privacy (WEP)and transmitted between two wireless devices __________.
(Multiple Choice)
4.8/5
(24)
Types of unintentional threats that organizations must defend against as part of their IT security measures are human errors,sabotage,environmental hazards,and computer system failures.
(True/False)
4.9/5
(38)
The purpose of the PCI DSS is to improve customers'__________ in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.
(Essay)
4.8/5
(39)
What is the most cost-effective approach to managing fraud?
(Multiple Choice)
4.8/5
(40)
Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?
(Essay)
4.8/5
(42)
Which of the following is a characteristic of information security in organizations?
(Multiple Choice)
4.8/5
(39)
__________,such as AirSnort and WEPcrack,are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
(Multiple Choice)
4.9/5
(50)
Implementing security programs raises many ethical issues.Identify two of these ethical issues.
(Essay)
4.9/5
(36)
__________ is the ability of an IS to continue to operate when a failure occurs,usually operating for a limited time or at a reduced level.
(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)