Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Essentials of MIS Global
Quiz 8: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Statements ranking information risks and identifying security goals are included in a(n)
Question 42
Multiple Choice
The most common type of electronic evidence is
Question 43
Multiple Choice
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
Question 44
Multiple Choice
The HIPAA Act of 1996
Question 45
Multiple Choice
The Gramm-Leach-Bliley Act
Question 46
Essay
What are the security challenges faced by wireless networks?
Question 47
Multiple Choice
Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
Question 48
Multiple Choice
Computer forensics tasks include all of the following except
Question 49
Essay
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
Question 50
Multiple Choice
The Sarbanes-Oxley Act
Question 51
Multiple Choice
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
Question 52
Essay
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?
Question 53
Essay
Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.
Question 54
Multiple Choice
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
Question 55
Multiple Choice
Which of the following is a type of ambient data?
Question 56
True/False
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
Question 57
Multiple Choice
Application controls
Question 58
Essay
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
Question 59
Essay
Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?