Exam 5: Protecting Information Resources
Exam 1: Information Systems in Business122 Questions
Exam 2: Computers and Their Business Applications117 Questions
Exam 3: Data and Business Intelligence127 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues124 Questions
Exam 5: Protecting Information Resources122 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime121 Questions
Exam 7: A Connected World118 Questions
Exam 8: E-Commerce128 Questions
Exam 9: Global Information Systems124 Questions
Exam 10: Building Successful Information Systems106 Questions
Exam 11: Enterprise Systems135 Questions
Exam 12: Supporting Decisions and Processes110 Questions
Exam 13: Artificial Intelligence and Automation125 Questions
Exam 14: Emerging Trends, Technologies, and Applications112 Questions
Select questions type
When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
(True/False)
4.7/5
(32)
A(n)_____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Multiple Choice)
4.9/5
(32)
Discuss the functions of the Computer Emergency Response Team (CERT).
(Essay)
4.9/5
(43)
A _____ consists of self-propagating program code that is triggered by a specified time or event.
(Multiple Choice)
4.8/5
(33)
Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
(Multiple Choice)
4.8/5
(33)
The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.
(True/False)
4.8/5
(34)
In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.
(True/False)
5.0/5
(36)
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.9/5
(39)
When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.
(True/False)
4.9/5
(32)
_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
(Multiple Choice)
4.8/5
(29)
List several different types of intentional computer and network security threats.
(Essay)
5.0/5
(39)
In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.
(Multiple Choice)
4.8/5
(42)
Which type of access control is used to protect systems from unauthorized access?
(Multiple Choice)
4.8/5
(39)
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.
(Multiple Choice)
4.7/5
(35)
Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks.
(Essay)
4.9/5
(38)
Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.
(True/False)
5.0/5
(32)
Showing 61 - 80 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)