Which of the following focuses primarily on the technical issues of keeping systems up and running?

When autocomplete results are available use up and down arrows to review and enter to select. Touch device users, explore by touch or with swipe gestures.

Which of the following focuses primarily on the technical issues of keeping systems up and running?

If you fancy being part of the Monaco lifestyle, it’s never going to be cheap. If you’re going to turn up on the Monaco roads

Which of the following focuses primarily on the technical issues of keeping systems up and running?

If you fancy being part of the Monaco lifestyle, it’s never going to be cheap. If you’re going to turn up on the Monaco roads

If you fancy being part of the Monaco lifestyle, it’s never going to be cheap. If you’re going to turn up on the Monaco roads

Which of the following focuses primarily on the technical issues of keeping systems up and running?

1

Copyright © 2020 Pearson Education, Inc.

Management Information Systems: Managing the Digital Firm, 16e (Laudon)

Chapter 8 Securing Information Systems

1) Which of the following refers to policies, procedures, and technical measures used to prevent

unauthorized access, alteration, theft, or physical damage to information systems?

A) Security

B) Controls

C) Benchmarking

D) Algorithms

E) Identity management

Answer: A

Difficulty: Moderate

AACSB: Application of knowledge

LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?

2) Which of the following refers to all of the methods, policies, and organizational procedures

that ensure the safety of the organization's assets, the accuracy and reliability of its accounting

records, and operational adherence to management standards?

A) Legacy systems

B) SSID standards

C) Vulnerabilities

D) Security policy

E) Controls

Answer: E

Difficulty: Moderate

AACSB: Application of knowledge

LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?

3) Most computer viruses deliver a:

A) worm.

B) Trojan horse.

C) driveby download.

D) keylogger.

E) payload.

Answer: E

Difficulty: Easy

AACSB: Application of knowledge

LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Management Information Systems: Managing the Digital Firm, 15e (Laudon)

Chapter 8 Securing Information Systems

1) Which of the following refers to policies, procedures, and technical measures used to prevent

unauthorized access, alteration, theft, or physical damage to information systems?

A) Security

B) Controls

C) Benchmarking

D) Algorithms

E) Identity management

Answer: A

Difficulty: Moderate

AACSB: Application of knowledge

LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?

2) Which of the following refers to all of the methods, policies, and organizational procedures

that ensure the safety of the organization's assets, the accuracy and reliability of its accounting

records, and operational adherence to management standards?

A) Legacy systems

B) SSID standards

C) Vulnerabilities

D) Security policy

E) Controls

Answer: E

Difficulty: Moderate

AACSB: Application of knowledge

LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?

3) Most computer viruses deliver a:

A) worm.

B) Trojan horse.

C) driveby download.

D) keylogger.

E) payload.

Answer: E

Difficulty: Easy

AACSB: Application of knowledge

LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?

1

Copyright © 2018 Pearson Education, Inc.

What focuses primarily on the technical issues of keeping systems up and running?

Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services.

Which of the following refers to policies procedures and technical measures used to prevent?

Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Which of the following is the most common type of electronic evidence?

E-mail is currently the most common type of electronic evidence.

Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver?

Stateful inspection determines whether packets are part of an ongoing dialogue between a sender and a receiver. Network Address Translation (NAT) conceals the IP addresses of the organization's internal host computer(s) to protect against sniffer programs outside the firewall.