Exam 13: Information Security
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems140 Questions
Exam 3: Data and Knowledge Management101 Questions
Exam 4: Networks132 Questions
Exam 5: E-Business and E-Commerce109 Questions
Exam 6: Wireless, Mobile Computing, and Mobile Commerce118 Questions
Exam 7: Web 2.0 and Social Networks72 Questions
Exam 8: Information Systems Within the Organization98 Questions
Exam 9: Customer Relationship Management and Supply Chain Management141 Questions
Exam 10: Business Intelligence100 Questions
Exam 11: Acquiring Information Systems and Applications119 Questions
Exam 12: Ethics and Privacy66 Questions
Exam 13: Information Security114 Questions
Exam 14: Tech Guide 1: Hardware76 Questions
Exam 15: Tech Guide 2: Software53 Questions
Exam 16: Tech Guide 3: Emerging types of enterprise computing57 Questions
Exam 17: Tech Guide 4: Intelligent Systems61 Questions
Exam 18: Tech Guide 5: Protecting your information assets44 Questions
Select questions type
Which of the following statements is false?
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
The Internet is a(n)___________ network.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
Supervisory control and data acquisition (SCADA)systems require human data input.
(True/False)
4.9/5
(36)
The area located between two firewalls within an organization is called the demilitarized zone.
(True/False)
4.8/5
(35)
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.
(Multiple Choice)
4.8/5
(43)
Which of the following is not a characteristic of strong passwords?
(Multiple Choice)
4.9/5
(29)
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.
(Multiple Choice)
4.9/5
(35)
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.
(Multiple Choice)
5.0/5
(30)
Voice recognition is an example of "something a user does" authentication.
(True/False)
4.8/5
(35)
You start a new job, and the first thing your new company wants you to do is create a user ID and a password.Which of the following would be a strong password?
(Multiple Choice)
4.8/5
(28)
You receive an e-mail from your bank informing you that they are updating their records and need your password.Which of the following statements is true?
(Multiple Choice)
4.7/5
(35)
Risk analysis involves determining whether security programs are working.
(True/False)
4.9/5
(31)
Which of the following is not an example of a weak password?
(Multiple Choice)
4.9/5
(32)
Risk is the ___________ that a threat will impact information resources.
(Short Answer)
4.8/5
(48)
The cost of a stolen laptop includes all of the following except:
(Multiple Choice)
4.7/5
(29)
Organizations use hot sites, warm sites, and cold sites to insure business continuity.Which of the following statements is not true?
(Multiple Choice)
4.8/5
(34)
The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.
(True/False)
4.9/5
(37)
Unintentional threats to information systems include all of the following except:
(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 114
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)