Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems116 Questions
Exam 3: Ethics and Privacy51 Questions
Exam 4: Information Security and Controls91 Questions
Exam 5: Data and Knowledge Management90 Questions
Exam 6: Telecommunications and Networking108 Questions
Exam 7: E-Business and E-Commerce90 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce93 Questions
Exam 9: Social Computing61 Questions
Exam 10: Information Systems Within the Organization84 Questions
Exam 11: Customer Relationship Management and Supply Chain Management128 Questions
Exam 12: Business Intelligence82 Questions
Exam 13: Acquiring Information Systems and Applications95 Questions
Exam 14: Technology Guide 1 Hardware56 Questions
Exam 15: Technology Guide 2 Software40 Questions
Exam 16: Technology Guide 3 Cloud Computing42 Questions
Exam 17: Technology Guide 4 Intelligent Systems36 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets45 Questions
Select questions type
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.
(True/False)
5.0/5
(38)
Rank the following in terms of dollar value of the crime, from highest to lowest.
(Multiple Choice)
4.8/5
(33)
Define the principle of least privilege, and consider how an organization's senior executives might view the application of this principle.
(Not Answered)
This question doesn't have any answer yet
Which of the following factors is not increasing the threats to information security?
(Multiple Choice)
4.8/5
(37)
Public-key encryption uses two different keys, one public and one private.
(True/False)
4.8/5
(25)
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage.
(True/False)
5.0/5
(34)
Supervisory control and data acquisition (SCADA) systems require human data input.
(True/False)
4.9/5
(38)
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.
(Multiple Choice)
4.7/5
(32)
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?
(Multiple Choice)
4.8/5
(38)
Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim's information security strategy.
(Not Answered)
This question doesn't have any answer yet
Having one backup of your business data is sufficient for security purposes.
(True/False)
4.8/5
(37)
Zero-day attacks use deceptive e-mails to acquire sensitive personal information.
(True/False)
4.8/5
(40)
A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security.
(True/False)
4.7/5
(44)
The computing skills necessary to be a hacker are decreasing for which of the following reasons?
(Multiple Choice)
4.8/5
(32)
Which of the following statements concerning firewalls is not true?
(Multiple Choice)
4.9/5
(32)
Contrast the four types of authentication.
(Not Answered)
This question doesn't have any answer yet
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
(Multiple Choice)
4.9/5
(36)
Which of the following is not a consequence of poor information security practices?
(Multiple Choice)
4.9/5
(42)
Showing 61 - 80 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)