When autocomplete results are available use up and down arrows to review and enter to select. Touch device users, explore by touch or with swipe gestures.
If you fancy being part of the Monaco lifestyle, it’s never going to be cheap. If you’re going to turn up on the Monaco roads
If you fancy being part of the Monaco lifestyle, it’s never going to be cheap. If you’re going to turn up on the Monaco roads
If you fancy being part of the Monaco lifestyle, it’s never going to be cheap. If you’re going to turn up on the Monaco roads
1
Copyright © 2020 Pearson Education, Inc.
Management Information Systems: Managing the Digital Firm, 16e (Laudon)
Chapter 8 Securing Information Systems
1) Which of the following refers to policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems?
A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
2) Which of the following refers to all of the methods, policies, and organizational procedures
that ensure the safety of the organization's assets, the accuracy and reliability of its accounting
records, and operational adherence to management standards?
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
Answer: E
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
3) Most computer viruses deliver a:
A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Answer: E
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
Management Information Systems: Managing the Digital Firm, 15e (Laudon)
Chapter 8 Securing Information Systems
1) Which of the following refers to policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems?
A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
2) Which of the following refers to all of the methods, policies, and organizational procedures
that ensure the safety of the organization's assets, the accuracy and reliability of its accounting
records, and operational adherence to management standards?
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
Answer: E
Difficulty: Moderate
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
3) Most computer viruses deliver a:
A) worm.
B) Trojan horse.
C) driveby download.
D) keylogger.
E) payload.
Answer: E
Difficulty: Easy
AACSB: Application of knowledge
LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse?
1
Copyright © 2018 Pearson Education, Inc.