Exam 4: Information Security
Exam 1: Introduction to Information Systems10 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems11 Questions
Exam 3: Ethics and Privacy10 Questions
Exam 4: Information Security15 Questions
Exam 5: Data and Knowledge Management21 Questions
Exam 6: Networks17 Questions
Exam 7: E-Business and E-Commerce20 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce20 Questions
Exam 9: Social Computing12 Questions
Exam 10: Enterprise Resource Planning Systems15 Questions
Exam 11: Crm and Scm25 Questions
Exam 12: Business Intelligence16 Questions
Exam 13: Acquiring Information Systems and Applications18 Questions
Exam 14: Technology Guide 1 - Hardware10 Questions
Exam 15: Technology Guide 2 - Software9 Questions
Exam 16: Technology Guide 3 - Cloud Computing10 Questions
Select questions type
Which type of remote software attack does not require user action?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.
Free
(True/False)
4.7/5
(36)
Correct Answer:
True
The emergence of the Internet has decreased the threats to information security.
Free
(True/False)
4.7/5
(39)
Correct Answer:
False
Which if the following is not a common risk mitigation strategy?
(Multiple Choice)
4.8/5
(27)
If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.
(True/False)
4.9/5
(39)
A password system on a computer network is an example of which type of information security control?
(Multiple Choice)
4.8/5
(26)
Which of the following employees typically poses the most significant threat to information security?
(Multiple Choice)
4.7/5
(39)
Low level employees pose the greatest threat to information security.
(True/False)
4.9/5
(39)
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.
(True/False)
4.8/5
(33)
Which of the following is not a social engineering technique?
(Multiple Choice)
4.8/5
(29)
The threats to information security are _____, and the greatest threat is _____.
(Multiple Choice)
4.9/5
(34)
Which of the following would be an example of a SCADA attack?
(Multiple Choice)
4.8/5
(29)
____________ is an encryption standard used for secure transactions such as credit card processing and online banking.
(Multiple Choice)
5.0/5
(45)
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?
(Multiple Choice)
4.9/5
(29)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)