Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Experiencing MIS Study Set 3

Computing

Quiz 12 :

Information Security Management

Quiz 12 :

Information Security Management

search
arrow
Which of the following is an example of a data safeguard?
Free
Multiple Choice
Answer:

Answer:

C

arrow
Which of the following is a synonym for phishing?
Free
Multiple Choice
Answer:

Answer:

B

arrow
A ________ pretends to be a legitimate company and sends emails requesting confidential data.
Free
Multiple Choice
Answer:

Answer:

B

arrow
A password ________ a user.
Multiple Choice
Answer:
arrow
Mark recently received an email from what appeared to be a legitimate company,asking him to update and verify his credit card details.Unknowingly,he obliged and later realized that the information had been misused.Mark is a victim of ________.
Multiple Choice
Answer:
arrow
________ occurs when a person gains unauthorized access to a computer system.
Multiple Choice
Answer:
arrow
________ occur when bogus services flood a Web server.
Multiple Choice
Answer:
arrow
A problem in a customer billing system that occurs due to errors made during software installation is a case of ________.
Multiple Choice
Answer:
arrow
________ is a technique for intercepting computer communications.
Multiple Choice
Answer:
arrow
Which of the following is an example of a security threat resulting from malicious human activity?
Multiple Choice
Answer:
arrow
A person calls the Stark residence and pretends to represent a credit card company.He asks Mrs.Stark to confirm her credit card number.This is an example of ________.
Multiple Choice
Answer:
arrow
An employee carelessly releases proprietary data to the media.This is a case of ________.
Multiple Choice
Answer:
arrow
A user name ________ a user.
Multiple Choice
Answer:
arrow
Which of the following is a technical safeguard against security threats?
Multiple Choice
Answer:
arrow
Users of smart cards are required to enter a ________ to be authenticated.
Multiple Choice
Answer:
arrow
Which of the following is a human safeguard against security threats?
Multiple Choice
Answer:
arrow
Which of the following is considered a personal security safeguard?
Multiple Choice
Answer:
arrow
________ simply take computers with wireless connections through an area and search for unprotected wireless networks.
Multiple Choice
Answer:
arrow
Some unauthorized programs are able to ________ legitimate systems and substitute their own processing.
Multiple Choice
Answer:
arrow
A(n)________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Multiple Choice
Answer:
Showing 1 - 20 of 80