Exam 4: Information Security
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems113 Questions
Exam 3: Ethics and Privacy51 Questions
Exam 4: Information Security84 Questions
Exam 5: Data and Knowledge Management97 Questions
Exam 6: Networks110 Questions
Exam 7: E-Business and E-Commerce87 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce95 Questions
Exam 9: Social Computing84 Questions
Exam 10: Enterprise Resource Planning Systems85 Questions
Exam 11: Customer Relationship Management and Supply Chain Management130 Questions
Exam 11: Crm and Scm82 Questions
Exam 12: Business Intelligence85 Questions
Exam 14: Technology Guide 1 - Hardware56 Questions
Exam 15: Technology Guide 2 - Software41 Questions
Exam 16: Technology Guide 3 - Cloud Computing49 Questions
Exam 17: Technology Guide 4 - Intelligent Systems35 Questions
Select questions type
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
Contrast the four types of authentication.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
not answered
Tim ventured out into the world of retail by renting a cart at a local mall. His product is personalized coffee mugs. He uses his laptop to track sales and to process credit card sales. He has a customer mailing list that is updated by customers on the laptop as well. At the end of each day, Tim backs up all of his data to a thumb drive and puts the drive into the laptop case with the laptop. Discuss Tim's information security strategy.
(Short Answer)
5.0/5
(38)
An information system's _____ is the possibility that the system will be harmed by a threat.
(Multiple Choice)
4.7/5
(37)
The security of each computer on the Internet is independent of the security of all other computers on the Internet.
(True/False)
4.8/5
(39)
Compare trade secrets, patents, and copyrights as forms of intellectual property.
(Short Answer)
4.8/5
(32)
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
(Multiple Choice)
4.7/5
(41)
Having one backup of your business data is sufficient for security purposes.
(True/False)
4.8/5
(32)
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?
(Multiple Choice)
4.9/5
(33)
You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?
(Multiple Choice)
4.8/5
(33)
You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security.
(True/False)
4.8/5
(41)
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.
(True/False)
4.8/5
(28)
Zero-day attacks use deceptive e-mails to acquire sensitive personal information.
(True/False)
4.9/5
(34)
Which of the following is not a characteristic of strong passwords?
(Multiple Choice)
4.9/5
(35)
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)