Exam 4: Information Security and Controls
Exam 1: Introduction to Information Systems10 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems12 Questions
Exam 3: Ethics and Privacy8 Questions
Exam 4: Information Security and Controls11 Questions
Exam 5: Data and Knowledge Management21 Questions
Exam 6: Telecommunications and Networking20 Questions
Exam 7: E-Business and E-Commerce21 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce18 Questions
Exam 9: Information Systems within the Organization16 Questions
Exam 10: Customer Relationship Management and Supply Chain Management29 Questions
Exam 11: Business Analytics14 Questions
Exam 12: Acquiring Information Systems and Applications14 Questions
Exam 13: Technology Guide 5: Protecting Your Information Assets8 Questions
Select questions type
Backup and recovery procedures are recommended only to safeguard against hardware/software failures.
Free
(True/False)
4.9/5
(34)
Correct Answer:
False
Making and distributing information goods to which you do not own the ___ is referred to as ____.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
A
Which of the following can be classified as unintentional threats to information systems caused by human errors?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
A
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of
(Multiple Choice)
4.9/5
(32)
Whereas phishing attacks are ____ , denial of service attacks are ____.
(Multiple Choice)
4.9/5
(33)
An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.
(Multiple Choice)
4.9/5
(38)
_____ can be used to create strong passwords that are easy to remember.
(Multiple Choice)
4.9/5
(36)
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:
(Multiple Choice)
4.8/5
(32)
Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.
(Multiple Choice)
4.8/5
(39)
Access controls consist of ____, which confirms user identity, and ____, which determines user access levels.
(Multiple Choice)
5.0/5
(38)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)