Information System and Security MCQs

Information System and Security MCQs

Try to answer these 200+ Information System and Security MCQs and check your understanding of the Information System and Security subject. Scroll down and let's begin!

1: ___ of breaches are caused by stealing a password

A.   A very low percentage (somewhere around 1%)

B.   A low percentage (around 10%)

C.   A moderate percentage (around 25%)

D.   A high percentage (around 50%)

E.   A very high percentage (around 80%)

2: ____ can be used to determine whether new ip addresses are attempting to probe the network.

A.   Virtualization

B.   Firewall logs

C.   Network Layer

D.   IEEE 802.1x

3: ____ supports network neutrality

A.   Content-filtering software

B.   Google

C.   Emoney

D.   Pervasive

4: _____ networks use multiple wi-fi access points to create a wide area network.

A.   Mesh networks

B.   Pervasive networks

C.   Global networks

D.   Fixed networks

E.   Ubiquitous networks

5: _____ prevents new adware from being installed on your computer.

A.   Web harvesting

B.   Cybersquatting

C.   Intelligent agents

D.   Antispyware

6: _____ provide the standards, syntax, statements, and instructions for writing computer software.

A.   Operating systems

B.   Application servers

C.   Database management systems

D.   Platforms

E.   Programming languages

7: ________refers to a precise set of instructions that tell the computer hardware what to do.

A.   A mnemonic

B.   An input device

C.   An output device

D.   Software

8: ___________________ is the act of protecting information and the systems that store and process it.

A.   Guidelines

B.   Acceptable use policies

C.   Label

D.   Information systems security

9: A ____ is a cryptographic means of authentication.

A.   CryptoHeaven

B.   Message-digest

C.   Digital signature

D.   Idle CPU Time

10: A ____ is a shared electrical or optical channel that connects two or more devices.

A.   Trace

B.   Bus

C.   Route

D.   Connection

11: A ____ is usually the best approach to security project implementation.

A.   Parallel operation

B.   Direct changeover

C.   Phased implementation

D.   Pilot

12: A _____ is a simple database program whose records have no relationship to one another.

A.   Flat file

B.   Schema

C.   Relational system

D.   User view

13: A ________________ is a software tool for specifying the content and format for a database report.

A.   Structured

B.   Report generator

C.   Analytical

D.   Scale up, scale out

14: A computer hacker usually gets into a company’s network by _____.

A.   Befriending someone who works for the company

B.   Finding a single unlocked door in a virtual hallway

C.   None of the above

15: A computer is the ____ of an attack when it is used to conduct the attack.

A.   Subject

B.   Target

C.   Object

16: A field or a group of fields that make a record unique in a table is called a(n) ________.

A.   Primary key

B.   Autonumber.

C.   Central entity

17: A genetic algorithm is an approach to solving problems based on the _____.

A.   Theory of evolution

B.   Theory of relativity

C.   Compton Effect

18: Global positioning system (gps) consists of ____ and a group of gps satellites.

A.   GPS transmitters

B.   Wi-Fi receivers

C.   GPS amplifiers

D.   GPS receivers

19: A merge operation in word generally requires _____ files(s).

A.   Two

B.   Three

C.   Four

20: A secure system includes _____ that can log every instance of data entry and changes.

A.   Audit trails

B.   Trap trails

C.   Batch trails

D.   Control trails

21: A security awareness program includes ________

A.   Motivating users to comply with security policies

B.   Informing users about trends and threats in society

C.   Teaching employees about security objectives

D.   All of the above

22: An example of a wi-fi security standard is ____.

A.   WPA

B.   SSL

C.   WIP

D.   OTP

23: In comparison with unstructured information, semi-structured information ________.

A.   Is more difficult to break down

B.   Has no inherent order

C.   Is easier to query and aggregate

D.   Is more difficult to link together

24: In data encryption, the https indicates a safe http connection over _____.

A.   Proxy server

B.   Social engineering

C.   Virtual private network

D.   Secure Sockets Layer

25: In information systems, saas stands for ________.

A.   SOCIOTECHNICAL APPROACH

B.   SOFTWARE AS A SERVICE

C.   DYNAMIC TICKET PRICING

D.   COMPETITIVE ADVANTAGE

26: In order to protect your password, you should never ________.

A.   Use the password more than three times in a day

B.   Write down your password

C.   Use virtual keyboards to enter your password

D.   Create passwords containing multiple special characters

27: In terms of password management, when an account is created, users should ________.

A.   Immediately change the password they are given to a password of their own

B.   Documenting position sensitivity enables security personnel to prioritize their activities.

C.   The financial losses faced by companies due to human error are enormous.

D.   Personal identification number

28: In the context of web and network privacy, an acceptable use policy is _____.

A.   Use verification procedures to ensure data accuracy.

B.   Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

C.   Spam

D.   Cybersquatting

29: Many corporations use a ____ to help secure the confidentiality and integrity of information.

A.   Weighted factor analysis

B.   Operational feasibility

C.   Disadvantage

D.   Data Classification Scheme

30: Scsi is a ____ interface and not just an interface technique for hard disk drives.

A.   Systems

B.   SCSI

C.   Synchronous

D.   InfiniBand

31: Security systems ultimately depend on the behavior of their ________.

A.   Users

B.   Hardware

C.   Software

D.   Data

32: To connect multiple businesses from different locations, a ____ area network setup could be used.

A.   Spider

B.   WiMAX

C.   Home

D.   Wide

33: The practice of using similar but not identical domain names is called _____.

A.   Domain tasting

B.   Smart cards

C.   Cybersquatting

D.   Government-to-citizen

34: The field in a table that is used to relate that table to other tables is called the ____.

A.   Index

B.   User interface

C.   False

D.   Primary key

35: When loops are nested, _____.

A.   Captive

B.   Unstructured

C.   Inner

D.   Outer

36: To avoid the look of missing data in a report, use the hide duplicates property on ____ fields.

A.   Control

B.   Sorted

C.   COUNT

D.   Date

37: To define styles under landscape orientation, use the @media rule, setting the orientation to ____.

A.   Landscape

B.   Portrait

C.   Normal

D.   Page layout

38: To delete rows from the database, use the ____ command.

A.   ROLLBACK

B.   COMMIT

C.   DELETE

D.   UPDATE

E.   DELETE

39: To describe a queuing system, we use the term ____ for the object that provides the service.

A.   Overflow

B.   Server

C.   Simulation

D.   Customer

40: To display the contents of a file called data, use the command ____.

A.   Disp data

B.   Ls -l data

C.   Ls data

D.   Cat data

41: To organize large amounts of information, it is best to use ____.

A.   Banded

B.   Tables

C.   Tab stop

D.   True

42: Trait theorists are generally more interested in __________ rather than __________.

A.   Assessing abnormal behavior. . . explaining why behavior occurs

B.   Explaining why behavior occurs . . . predicting behavioral patterns

C.   Assessing abnormal behavior . . . describing patterns of behavior

D.   Describing patterns of behavior . . . explaining why behavior occurs

43: With respect to computer networks, ________ are also referred to as wi-fi networks.

A.   Storage area networks

B.   Wireless body sensor networks

C.   Wireless local area networks

D.   None of these

44: The _________ lock can make it difficult for thieves to steal a laptop.

A.   Bandwidth

B.   Kensigton

C.   Scareware

D.   Fiber-optic

45: The two types of malware that have the primary objective of infecting a computer system are ____.

A.   Signature

B.   Data backups

C.   Viruses and worms

D.   Buffer overflow

46: Whereas phishing attacks are ________, denial of service attacks are ________.

A.   Remote attacks requiring user action; remote attacks requiring no user action

B.   Remote attacks requiring no user action; attacks by a programmer developing a system

C.   Remote attacks requiring no user action; remote attacks requiring user action

D.   Distributed remote attacks requiring user action; attacks by a programmer developing a system

47: The application gateway is also known as a(n) ____

A.   All of the above

B.   Rating and filtering

C.   Application-level firewall

D.   Proxy

48: The best and most effective way to manage authentication is through ___________.

A.   Encryption

B.   Firewall

C.   Password

D.   Biometrics

49: The ________ component of the is framework provides instructions for people.

A.   Procedure

B.   Software

C.   Information

D.   Data

50: The term _____ best describes the level of technology skills needed in today’s business world.

A.   Computer knowledge

B.   Computer fluency

C.   Computer digitization

D.   Computer information

51: A(n) ____ is the computer program that converts plaintext into an enciphered form.

A.   Worm

B.   Firewall

C.   Trojan horse

D.   Encryption algorithm

52: A(n) _____ is not decrypted but is only used for comparison purposes.

A.   Stream

B.   Digest

C.   Algorithm

D.   Key

53: In asymmetric encryption, each site has a ________ for encoding messages.

A.   Botnet

B.   Private key

C.   Public key

D.   Cookie

54: Digital signatures are used for ________ authentication.

A.   Message authentication

B.   Message integrity

C.   None of the above

D.   All of the above

55: During modeling of the crisp-dm method, we would ______.

A.   Support and improve decision making

B.   Automated customer service

C.   Apply selected modeling techniques

D.   Present the results in an easy to understand manner

56: In the five-component model, the process of automation is a process of moving work from ________.

A.   The digital mode to the analog mode

B.   The analog mode to the digital mode

C.   None of these

D.   Both of these

57: ____ refers to identifying the browser used by each visitor, typically via javascript code.

A.   Browser mapping

B.   Browser sniffing

C.   Visitor identification

D.   Personalization

58: The audience for pseudocode is the _____.

A.   Analyst

B.   Programmer

C.   Manager

D.   User

59: The office ____ is a temporary storage area.

A.   Warehouse

B.   Clipboard

C.   Storehouse

D.   Gallery

60: Traditional data formats change ______ while big data formats change _______.

A.   Slowly, rapidly

B.   Rapidly, slowly

C.   Slowly, incrementally

D.   Both formats of data change at the same rate

61: Wpa replaces wep with _____.

A.   WPA2

B.   Temporal Key Integrity Protocol (TKIP)

C.   Cyclic redundancy check (CRC)

D.   Message Integrity Check (MIC

62: As an is user, you have a right to a secure computing environment. this means that ________.

A.   The organization should protect your computer and its files

B.   You should protect the organization's computers and files

C.   You should inform the IS about any software upgrades

D.   You will never face a network problem

63: An sla for latency should specify a ________.

A.   Maximum latency.

B.   Minimum latency.

C.   Both A and B

D.   Neither A nor B

64: The characteristics of online processing systems are that _____.

A.   Users can access data randomly

B.   Users interact with the information system

C.   The system process transactions completely when and where they occur

D.   All of these

65: When using a(n) ____ join, only rows that meet the given criteria are returned.

A.   Full

B.   Inner

C.   Outer

D.   Set

66: You use ________ to predict when a computer hardware system becomes saturated.

A.   Capacity planning

B.   Virtualization

C.   Localization

D.   Measured service

67: Social capital, unlike traditional capital, ________.

A.   Remains constant with time

B.   Sometimes depreciates and at other times appreciates with time

C.   Appreciates with time, and never depreciates

D.   Depreciates with time, and never appreciates

68: If the time series in an exponential smoothing model exhibits a negative trend, the _____.

A.   Value of smoothing constant will either be less than zero or greater than one

B.   Future forecasts will rely solely upon expertise of people in developing forecasts

C.   Mean square error will be negative

D.   Forecast will overshoot the actual values

69: Parking meters that you can pay via your mobile telephone are an example of _________.

A.   Mobile banking

B.   Wireless electronic payment

C.   Wireless wallets

D.   All of these

70: The most basic level of data security in windows 7 is ____ permissions.

A.   NTFS

B.   FAT

C.   HFS

D.   FAT32

71: The ideal solution to the threat of malware is __________.

A.   Identification

B.   Removal

C.   Detection

D.   Prevention

72: The protocols pop3 and __________ can be used to manage your incoming mail.

A.   IMAP (Internet Message Access Protocol)

B.   Community edit

C.   Requests for improvements

D.   None of these

73: If the expression is false, the ________ operator will return true.

A.   AND

B.   NOT

C.   OR

D.   All of these

74: An entity that issues digital certificates is a _____.

A.   Certificate Signatory (CS)

B.   Digital Signer (DS)

C.   Certificate Authority (CA)

D.   Signature Authority (SA

75: Public key infrastructure (pki) _____.

A.   To verify the authenticity of the Registration Authorizer

B.   Certificate Authority (CA)

C.   Online Certificate Status Protocol (OCSP)

D.   Is the management of digital certificates

76: The most basic type of cryptographic algorithm is a ____ algorithm.

A.   Key

B.   RSA

C.   Hash

D.   AES

77: In an if...then statement, the ____ symbol is used to test for inequality.

A.   ​>

B.   ​<>

C.   ​=

D.   ​<

78: Most encryption for data stored on a laptop uses ____ cryptography.

A.   SSID

B.   MAC

C.   Private key

D.   Symmetric

79: ________ often get their authentication information from ________.

A.   Directory servers, central authentication servers

B.   Central authentication servers, metadirectory servers

C.   Central authentication servers, directory servers

D.   Metadirectory servers, central authentication servers

80: The best password will use ________.

A.   You need the key it was encrypted with to decrypt it so you can read the message.

B.   Help desk

C.   You need the private key to decrypt the message so you can read it.

D.   Upper- and lowercase letters of the alphabet with no words in any​ language, some special characters and some​ numbers, and will be at least 10 characters long

81: In a(n) ________ system, each step is dependent on the previous step being completed.

A.   Top-down.

B.   Rapid development.

C.   Bottom-up.

D.   Waterfall

82: A user name ________ a user.

A.   Authenticates.

B.   Identifies.

C.   Conceals.

D.   Encrypts

83: Besides its regular display, almost every font has ____ common stylistic sets.

A.   One

B.   Four

C.   Three

D.   Two

84: If you determine a virus has struck a system, the first step is to _________.

A.   Scan and clean infected systems

B.   Log the incident

C.   Unplug the machines from the network

D.   Notify appropriate organization leaders

85: The temperature of ignition is called the _________________________ of a material.

A.   Electronic

B.   Flame point

C.   Flame

D.   Sensor

86: A key feature of an enterprise system is that _________.

A.   It is exclusive to small and medium-sized enterprises (SMEs)

B.   It employs a database of key operational and planning data that can be shared by all

C.   It helps a business function isolate information other functions and other levels of management.

D.   It is only used by large organizations

87: A key feature on an enterprise resource planning system is that _____.

A.   Market research

B.   It employs a database of key operational and planning data that can be shared by all

C.   Online transaction processing

D.   Supply chain management

88: A __________ is a system that protects the computer network from unauthorized access.

A.   Lock.

B.   Guard.

C.   Shield.

D.   Firewall.

89: During the implementation phase of the systems development life cycle (sdlc), _____.

A.   Parallel

B.   Phased-in-phased-out

C.   Plunge

D.   Pilot

90: The goal of the planning phase for an information system project is to create a(n) ____________.

A.   Iterative SDLC

B.   Systems analysis and design

C.   Project development plan

D.   System development life cycle

91: _____ feasibility is concerned with whether a new system can be completed on time.

A.   Economic

B.   Operational

C.   Scheduling

D.   Technical

92: The ________characteristic of high-quality information ensures that all the values are correct.

A.   Accuracy

B.   AACSB

C.   Accurate

D.   None of these

93: _________ tags make it possible to search for photos or videos using keywords.

A.   Media

B.   Metadata

C.   BBS

D.   HTML

94: With respect to the general classes of computers, a ________ is used for small business computing.

A.   Workstation

B.   Personal computer

C.   Mainframe

D.   Server

E.   Supercomputer

95: ____ is text that has no formatting (such as bolding or underlining) applied.

A.   Plaintext

B.   Plain text

C.   Simpletext

D.   Simple text

96: _____ connect buyers and sellers across many industries and are used mainly for indirect materials.

A.   Horizontal exchanges

B.   Vertical exchanges

C.   None

97: _____ refers to efforts by unauthorized users to access data traveling over wireless networks.

A.   RF jamming

B.   War driving

C.   Eavesdropping

D.   Telemetry

E.   Installing rogue access devices

98: A planned series of actions in a corporation is a(n) ________.

A.   Strategy

B.   Sequence

C.   Process

D.   Anomaly

99: The _____ standard can transmit up to 75 mbps and has a range of 31 miles.

A.   Footprint

B.   WiMAX

C.   Geostationary

D.   802.11g

100: The _____ is not a component of the typical dss.

A.   Database

B.   Model base

C.   User interface

D.   Inference engine