Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems116 Questions
Exam 3: Ethics and Privacy51 Questions
Exam 4: Information Security and Controls91 Questions
Exam 5: Data and Knowledge Management90 Questions
Exam 6: Telecommunications and Networking108 Questions
Exam 7: E-Business and E-Commerce90 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce93 Questions
Exam 9: Social Computing61 Questions
Exam 10: Information Systems Within the Organization84 Questions
Exam 11: Customer Relationship Management and Supply Chain Management128 Questions
Exam 12: Business Intelligence82 Questions
Exam 13: Acquiring Information Systems and Applications95 Questions
Exam 14: Technology Guide 1 Hardware56 Questions
Exam 15: Technology Guide 2 Software40 Questions
Exam 16: Technology Guide 3 Cloud Computing42 Questions
Exam 17: Technology Guide 4 Intelligent Systems36 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets45 Questions
Select questions type
The security of each computer on the Internet is independent of the security of all other computers on the Internet.
(True/False)
4.7/5
(34)
Contrast spyware and spamware.
(Not Answered)
This question doesn't have any answer yet
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
(Multiple Choice)
4.8/5
(38)
In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was:
(Multiple Choice)
4.8/5
(34)
Discuss the possible consequences of a terrorist attack on a supervisory control and data acquisition (SCADA) system.
(Not Answered)
This question doesn't have any answer yet
Which of the following is not a characteristic of strong passwords?
(Multiple Choice)
4.8/5
(42)
Which of the following is not a strategy for mitigating the risk of threats against information?
(Multiple Choice)
4.8/5
(27)
Describe how a digital certificate works.
(Not Answered)
This question doesn't have any answer yet
Organizations utilize layers of controls because they face so many diverse threats to information security.
(True/False)
4.7/5
(36)
Dumpster diving is always illegal because it involves trespassing on private property.
(True/False)
4.8/5
(26)
A _____ is any danger to which an information resource may be exposed.
(Multiple Choice)
4.7/5
(26)
Unintentional threats to information systems include all of the following except:
(Multiple Choice)
4.8/5
(43)
An information system's _____ is the possibility that the system will be harmed by a threat.
(Multiple Choice)
4.8/5
(37)
Refer to IT's About Business 4.4 - Information Security at City National Bank and Trust: Using the M86 Security software allowed City National Bank and Trust to do all of the following except:
(Multiple Choice)
4.8/5
(32)
Voice recognition is an example of "something a user does" authentication.
(True/False)
4.9/5
(39)
Explain why anti-malware software is classified as reactive.
(Not Answered)
This question doesn't have any answer yet
Refer to IT's About Business 4.3 - The Stuxnet Worm: Which of the following statements is true?
(Multiple Choice)
4.8/5
(40)
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
(Multiple Choice)
4.7/5
(31)
Showing 21 - 40 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)