Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview208 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems, Data Warehouses and Data Marts105 Questions
Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication105 Questions
Exam 7: The Internet, Intranets, and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends, Technologies, and Applications105 Questions
Select questions type
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
4.9/5
(43)
Explain the use of callback modems as a nonbiometric security measure.
(Essay)
4.8/5
(27)
In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
(Multiple Choice)
4.8/5
(41)
The process of capturing and recording network traffic is referred to as _____.
(Multiple Choice)
4.9/5
(32)
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
(Multiple Choice)
4.7/5
(38)
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
(Multiple Choice)
4.8/5
(41)
In the context of access controls, briefly explain the guidelines that need to be followed to increase the effectiveness of passwords.
(Essay)
4.9/5
(43)
Which of the following statements is true of asymmetric encryption?
(Multiple Choice)
4.7/5
(42)
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
(Multiple Choice)
4.8/5
(30)
In the context of the common intentional security threats, which of the following statements best describes a worm?
(Multiple Choice)
4.9/5
(36)
Describe the three levels of security in a comprehensive security system.
(Essay)
4.9/5
(44)
The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.
(True/False)
4.8/5
(36)
Which of the following forms of text needs to be unscrambled using a decryption key?
(Multiple Choice)
4.8/5
(35)
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
(True/False)
4.7/5
(32)
_____is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
(Multiple Choice)
4.8/5
(41)
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
(Multiple Choice)
4.9/5
(30)
When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.
(True/False)
4.8/5
(37)
Showing 21 - 40 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)