Management Information Systems Chapter VIII Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is an example of two-factor authentication?

Bank Card.

Which of the following statements about internet security is not true?

Data stored in cloud systems is not vulnerable to attack.

All of the following are components of an effective electronically stored information (ESI) retention policy except:

Ensuring that ESI does not violate the information rights of users.

All of the following are specific security challenges that threaten corporate servers the communication lines in a client/server environment except:

Errors.

When hackers gain access to a database containing your personal private information, this is an example of:

Identity Theft.

Two-factor authentication utilizes a(n):

Multistep Process of Authentication.

The HIPAA Act of 1996:

Outlines medical security and privacy rules.

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security.

An employee clicks on a link in an Email from what looks like a fellow employee and is taken to a fraudulent website which asks for personal information is an example of:

Spear Fishing.

An information systems audit examines all of the following except:

The Firm's Financial Status.

Which of the following statements about why systems are vulnerable is true?

The potential for unauthorized access or damage to an information system can occur at many access points in a network.

Which of the following is the single greatest cause of network security breaches?

User Lack of Knowledge.

A digital certificate system:

Uses third-party CAs to validate a user's identity.

When a hacker discovers a security hole in software that is unknown to the software vendor, it is an example of:

Zero-Day Vulnerability.


Conjuntos de estudio relacionados

USMLE Step 2 CK Medical Subject Review: Pediatrics

View Set

Articles of Confederation, Shays' Rebellion, Constitutional Convention

View Set

Senior English Semester 1 Exam Study Guide

View Set

Age of Exploration PART 1 Review

View Set

World History Assyrians, Hittites, and Chaldeans

View Set

ABEKA World History and Culture Appendix Quiz V

View Set