Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems116 Questions
Exam 3: Ethics and Privacy51 Questions
Exam 4: Information Security and Controls91 Questions
Exam 5: Data and Knowledge Management90 Questions
Exam 6: Telecommunications and Networking108 Questions
Exam 7: E-Business and E-Commerce90 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce93 Questions
Exam 9: Social Computing61 Questions
Exam 10: Information Systems Within the Organization84 Questions
Exam 11: Customer Relationship Management and Supply Chain Management128 Questions
Exam 12: Business Intelligence82 Questions
Exam 13: Acquiring Information Systems and Applications95 Questions
Exam 14: Technology Guide 1 Hardware56 Questions
Exam 15: Technology Guide 2 Software40 Questions
Exam 16: Technology Guide 3 Cloud Computing42 Questions
Exam 17: Technology Guide 4 Intelligent Systems36 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets45 Questions
Select questions type
Describe public key encryption.
(Not Answered)
This question doesn't have any answer yet
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.
(Multiple Choice)
4.8/5
(39)
Compare trade secrets, patents, and copyrights as forms of intellectual property.
(Not Answered)
This question doesn't have any answer yet
You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security.
(True/False)
4.8/5
(35)
Refer to IT's About Business 4.2 - Virus Attack Hits the University of Exeter. Which of the following statements about the virus attack is true?
(Multiple Choice)
4.9/5
(40)
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.
(Multiple Choice)
4.8/5
(33)
Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?
(Multiple Choice)
4.7/5
(39)
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.
(Multiple Choice)
4.8/5
(44)
Contrast unintentional and deliberate threats to an information resource. Provide examples of both.
(Not Answered)
This question doesn't have any answer yet
Employees in which functional areas of the organization pose particularly grave threats to information security?
(Multiple Choice)
4.9/5
(41)
In _____, the organization purchases insurance as a means to compensate for any loss.
(Multiple Choice)
4.9/5
(34)
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.
(Multiple Choice)
4.9/5
(39)
Compare a hot site, a warm site, and a cold site as strategies for business continuity.
(Not Answered)
This question doesn't have any answer yet
Refer to Opening Case - Cybercriminals Use Social Networks for Targeted Attacks: Cybercriminals use Facebook for all of the following reasons except:
(Multiple Choice)
4.8/5
(34)
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.
(Multiple Choice)
4.8/5
(35)
Cybercriminals can obtain the information they need in order to assume another person's identity by:
(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)