Exam 5: Protecting Information Resources
Exam 1: Information Systems in Business122 Questions
Exam 2: Computers and Their Business Applications117 Questions
Exam 3: Data and Business Intelligence127 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues124 Questions
Exam 5: Protecting Information Resources122 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime121 Questions
Exam 7: A Connected World118 Questions
Exam 8: E-Commerce128 Questions
Exam 9: Global Information Systems124 Questions
Exam 10: Building Successful Information Systems106 Questions
Exam 11: Enterprise Systems135 Questions
Exam 12: Supporting Decisions and Processes110 Questions
Exam 13: Artificial Intelligence and Automation125 Questions
Exam 14: Emerging Trends, Technologies, and Applications112 Questions
Select questions type
Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster.
(Essay)
4.8/5
(42)
Social engineering is an attack that takes advantage of the backdoors in security systems.
(True/False)
4.7/5
(41)
Briefly list some of the indications of a computer being infected by a virus.
(Essay)
4.9/5
(35)
Which federal law requires IT professionals to test the effectiveness of security measures protecting a company's data and vital records?
(Multiple Choice)
4.7/5
(44)
Which of the following is not considered part of a comprehensive security plan?
(Multiple Choice)
4.8/5
(42)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
4.9/5
(36)
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
(Multiple Choice)
4.8/5
(40)
A _____ is a type of an intentional computer and network threat.
(Multiple Choice)
4.9/5
(36)
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
(Multiple Choice)
4.8/5
(40)
The Committee on National Security Systems (CNSS)proposed a model known as the _____ for evaluating information security.
(Multiple Choice)
4.9/5
(33)
In the event of disaster, organizations should document all actions taken to regain normality.
(True/False)
4.8/5
(27)
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
(Multiple Choice)
4.9/5
(27)
A hot site, an alternative site to use in case of disaster, does not have the necessary equipment to get up an running immediately.
(True/False)
4.8/5
(37)
_____ is a computer crime that involves destroying or disrupting computer services.
(Multiple Choice)
4.7/5
(25)
When developing a comprehensive security plan, employees' awareness of security problems should be minimized.
(True/False)
4.8/5
(36)
The top two targets for ransomware attacks are the __________.
(Multiple Choice)
4.9/5
(43)
In the context of biometric security measures, briefly describe some biometric devices and measures.
(Essay)
4.8/5
(36)
In the context of fault-tolerant systems, describe uninterruptible power supply (UPS).
(Essay)
4.8/5
(34)
Showing 101 - 120 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)