Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview208 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems, Data Warehouses and Data Marts105 Questions
Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication105 Questions
Exam 7: The Internet, Intranets, and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends, Technologies, and Applications105 Questions
Select questions type
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
D
Briefly discuss how a worm can disrupt a computer or a network.
Free
(Essay)
4.8/5
(32)
Correct Answer:
Answers will vary.A worm travels from computer to computer in a network, but it does not usually erase data.Unlike a virus, it is an independent program that can spread itself without having to be attached to a host program.It might corrupt data, but it usually replicates itself into a full-blown version that eats up computing resources, eventually bringing a computer or network to a halt.Well-known worms include Code Red, Melissa, and Sasser.Conficker, a recent worm, has infected millions of Windows computers.
Which of the following statements is true of phishing?
Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
B
_____is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.
(Multiple Choice)
4.9/5
(42)
An intrusion detection system (IDS) can protect networks against both external and internal access.
(True/False)
4.8/5
(34)
Data sent through a virtual private network (VPN) can be encrypted using the _____.
(Multiple Choice)
4.8/5
(33)
_____ is a computer crime that involves destroying or disrupting computer services.
(Multiple Choice)
4.9/5
(30)
Viruses can be transmitted through a network or through e-mail attachments.
(True/False)
4.9/5
(36)
The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.
(True/False)
4.7/5
(38)
Briefly discuss dumpster diving and shoulder surfing, two commonly used social-engineering techniques.
(Essay)
4.9/5
(34)
A _____consists of self-propagating program code that is triggered by a specified time or event.
(Multiple Choice)
4.9/5
(34)
Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?
(Multiple Choice)
4.9/5
(32)
When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
(True/False)
4.8/5
(29)
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
(Multiple Choice)
4.9/5
(32)
_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.
(Multiple Choice)
5.0/5
(37)
A level 1 security system is used to protect _____ against unauthorized access.
(Multiple Choice)
4.9/5
(27)
In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.
(True/False)
4.9/5
(30)
Showing 1 - 20 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)