MIS 200 EXAM 4 REVIEW COMPLETE
QUESTIONS AND CORRECT ANSWERS |
UPDATED 2025
A tradeoff of information systems security is between cost and risk (T/F)
True
Which of the following is NOT one of the main security threats?
Human Error
Computer Crime
Packet Tracing
Natural Disasters
Packet Tracing
Which of the following is NOT an example of unauthorized disclosure?
Penetration Testing
Pretexting
Sniffing
Phising
Penetration Testing
, __ is another term for someone pretending to be someone else.
Malware
Spoofing
Sniffing
Virus
Spoofing
Illegally accessing a database or internal system would be an example of __.
Pretexting
Spoofing
Sniffing
Hacking
Hacking
__ occurs when computer criminals invade a computer system and replace
legitimate programs with unauthorized ones.
War driving
Usurping
QUESTIONS AND CORRECT ANSWERS |
UPDATED 2025
A tradeoff of information systems security is between cost and risk (T/F)
True
Which of the following is NOT one of the main security threats?
Human Error
Computer Crime
Packet Tracing
Natural Disasters
Packet Tracing
Which of the following is NOT an example of unauthorized disclosure?
Penetration Testing
Pretexting
Sniffing
Phising
Penetration Testing
, __ is another term for someone pretending to be someone else.
Malware
Spoofing
Sniffing
Virus
Spoofing
Illegally accessing a database or internal system would be an example of __.
Pretexting
Spoofing
Sniffing
Hacking
Hacking
__ occurs when computer criminals invade a computer system and replace
legitimate programs with unauthorized ones.
War driving
Usurping