Exam 5: Protecting Information Resources
Exam 1: Information Systems in Business122 Questions
Exam 2: Computers and Their Business Applications117 Questions
Exam 3: Data and Business Intelligence127 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues124 Questions
Exam 5: Protecting Information Resources122 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime121 Questions
Exam 7: A Connected World118 Questions
Exam 8: E-Commerce128 Questions
Exam 9: Global Information Systems124 Questions
Exam 10: Building Successful Information Systems106 Questions
Exam 11: Enterprise Systems135 Questions
Exam 12: Supporting Decisions and Processes110 Questions
Exam 13: Artificial Intelligence and Automation125 Questions
Exam 14: Emerging Trends, Technologies, and Applications112 Questions
Select questions type
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
Free
(True/False)
4.8/5
(18)
Correct Answer:
False
The cost of setting up a virtual private network (VPN)is usually high.
Free
(True/False)
4.7/5
(34)
Correct Answer:
False
_____ uses a public key known to everyone and a private key known only to the recipient.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
B
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.
(Multiple Choice)
4.9/5
(39)
An organization's comprehensive security plan should include procedures for installing software patches and updates on a regular basis.
(True/False)
4.9/5
(33)
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
5.0/5
(31)
_____ is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
(Multiple Choice)
4.9/5
(33)
If disaster strikes, which of the following is a step that an organization should follow in order to resume normal operations?
(Multiple Choice)
4.9/5
(30)
A(n)_____ contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
(Multiple Choice)
4.9/5
(34)
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
(Multiple Choice)
4.8/5
(35)
Describe the three levels of security in a comprehensive security system.
(Essay)
4.9/5
(29)
Viruses can be transmitted through a network or through e-mail attachments.
(True/False)
4.8/5
(43)
If a drive in a redundant array of independent disks (RAID)system fails, data stored on it can be reconstructed from data stored on the remaining drives.
(True/False)
4.9/5
(34)
Data sent through a virtual private network (VPN)can be encrypted using the _____.
(Multiple Choice)
4.9/5
(37)
When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.
(True/False)
4.7/5
(36)
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
(Multiple Choice)
4.9/5
(47)
Showing 1 - 20 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)