Exam 5: Protecting Information Resources
Exam 1: Information Systems in Business122 Questions
Exam 2: Computers and Their Business Applications117 Questions
Exam 3: Data and Business Intelligence127 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues124 Questions
Exam 5: Protecting Information Resources122 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime121 Questions
Exam 7: A Connected World118 Questions
Exam 8: E-Commerce128 Questions
Exam 9: Global Information Systems124 Questions
Exam 10: Building Successful Information Systems106 Questions
Exam 11: Enterprise Systems135 Questions
Exam 12: Supporting Decisions and Processes110 Questions
Exam 13: Artificial Intelligence and Automation125 Questions
Exam 14: Emerging Trends, Technologies, and Applications112 Questions
Select questions type
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?
(Multiple Choice)
4.9/5
(31)
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
(Multiple Choice)
4.9/5
(36)
_____ is a form of spyware that collects information about a user (without the user's consent)to determine which commercials to display in the user's Web browser.
(Multiple Choice)
4.9/5
(37)
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
(True/False)
4.8/5
(33)
The main drawback of an intrusion detection system (IDS)is its inability to prevent denial-of-service (DoS)attacks.
(True/False)
4.8/5
(30)
According to a 2019 study, which of the following is not an accurate statistic about ransomware attacks?
(Multiple Choice)
4.9/5
(35)
An intrusion detection system (IDS)can protect networks against both external and internal access.
(True/False)
4.9/5
(41)
Which form of text needs to be unscrambled using a decryption key?
(Multiple Choice)
4.8/5
(38)
_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.
(Multiple Choice)
4.8/5
(42)
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
(Multiple Choice)
4.9/5
(35)
In the context of business continuity planning, list at least five of the procedures for keeping an organization operational in the event of a disaster.
(Essay)
4.8/5
(35)
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
(Multiple Choice)
4.8/5
(31)
_____ , a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
(Multiple Choice)
4.7/5
(31)
Which statement is true of application-filtering firewalls?
(Multiple Choice)
4.8/5
(32)
In the context of access controls, briefly explain the guidelines that need to be followed to increase the effectiveness of passwords.
(Essay)
4.8/5
(30)
Briefly discuss dumpster diving and shoulder surfing, two commonly used social-engineering techniques.
(Essay)
4.8/5
(31)
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
(Multiple Choice)
4.9/5
(37)
Showing 41 - 60 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)