Exam 4: Information Security
Exam 1: Introduction to Information Systems131 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems165 Questions
Exam 3: Ethics and Privacy122 Questions
Exam 4: Information Security169 Questions
Exam 5: Data and Knowledge Management145 Questions
Exam 6: Telecommunications and Networking192 Questions
Exam 7: E-Business and E-Commerce132 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce159 Questions
Exam 9: Social Computing117 Questions
Exam 10: Information Systems Within the Organization108 Questions
Exam 11: CRM and SCM170 Questions
Exam 12: Acquiring Information Systems and Applications148 Questions
Exam 13: TG 1. Hardware106 Questions
Exam 14: TG 2. Software61 Questions
Exam 15: TG 3. Cloud Computing100 Questions
Exam 16: TG 4. Artificial Intelligence46 Questions
Select questions type
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.
Free
(Multiple Choice)
5.0/5
(44)
Correct Answer:
D
If you accept the potential risk,continue operating with no controls,and absorb any damages that occur,you have adopted a risk _________ strategy.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
A
The most current form of ransomware demands payment in the form of _________.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
Keystroke loggers and screen scrapers are examples of _________.
(Multiple Choice)
4.8/5
(29)
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical,real-world harm or severe disruption,often to carry out a political agenda.
(Multiple Choice)
4.8/5
(33)
Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.
(Multiple Choice)
4.7/5
(40)
Once a copyright and patent is established,it applies to all countries in the world.
(True/False)
4.9/5
(39)
The Democratic National Committee had excellent security on their computer systems,but hackers were simply too good to stop with their advanced use of viruses.
(True/False)
4.8/5
(42)
___ are small amounts of information that websites store on your computer,temporarily or more or less permanently.
(Short Answer)
4.9/5
(36)
You leave your laptop at your desk while you go to the restroom.This is _________ and is an _________ mistake.
(Multiple Choice)
4.8/5
(37)
People tend to violate security procedures because the procedures are inconvenient.
(True/False)
4.7/5
(36)
_________ is pestware that users your computer as a launch pad for unsolicited e-mail,usually advertising for products and services.
(Multiple Choice)
4.8/5
(31)
You need to be particularly careful of tailgating at airport terminals.
(True/False)
4.9/5
(35)
A(n)_________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.
(Multiple Choice)
4.8/5
(28)
An information resource's _________ is the possibility that the system will be harmed by a threat.
(Multiple Choice)
4.9/5
(29)
Whitelisting allows nothing to run unless it is on the whitelist.
(True/False)
4.8/5
(28)
_________ controls secure the movement of data across networks.
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 169
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)