You are on page 1of 10

Question 1

Not yet answered


Marked out of 1.00

Flag question
Question text
Biometrics are an example of:
Select one:
a. something the user wants.
b. something the user knows.
c. something the user does.
d. something the user has.
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
A wiki is a collection of blogs.
Select one:
a. True
b. False
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
In _________ , the organization purchases insurance as a means to
compensate for any loss.
Select one:
a. risk acceptance
b. risk analysis
c. risk transference
d. risk management
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
If you are an worker managing your fringe benefits over your
company's intranet, you are engaging in _______ e-commerce.
Select one:
a. business-to-employee
b. consumer-to-consumer
c. e-government
d. business-to-business
e. business-to-consumer
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
In a process called _________, a company allows nothing to run
unless it is approved, whereas in a process called _________, the
company allows everything to run unless it is not approved.
Select one:
a. whitelisting, blacklisting
b. encryption, blacklisting
c. whitelisting, encryption
d. encryption, whitelisting
e. blacklisting, whitelisting
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
Channel conflict occurs when click-and-mortar companies have
problems with their regular distributors when they sell directly to
customers online.
Select one:
a. True
b. False
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
IT security is the responsibility of everyone in the organization.
Select one:
a. False
b. True
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
____________ restrict unauthorized individuals from using information
resources and are concerned with user identification.
Select one:
a. Access controls
b. Administrative controls
c. Physical controls
d. Communication controls
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
E-commerce affects only businesses that sell products online.
Select one:
a. False
b. True
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
Unintentional threats to information systems include all of the following
except:
Select one:
a. malicious software
b. power outage
c. tornados
d. lack of user experience

You might also like