Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview208 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems, Data Warehouses and Data Marts105 Questions
Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication105 Questions
Exam 7: The Internet, Intranets, and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends, Technologies, and Applications105 Questions
Select questions type
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
(True/False)
4.7/5
(37)
In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.
(Multiple Choice)
4.8/5
(35)
Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.
(True/False)
4.9/5
(38)
In the context of biometric security measures, briefly describe some biometric devices and measures.
(Essay)
4.8/5
(29)
A(n) _____is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Multiple Choice)
4.8/5
(38)
_____is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.monitor and record the keys pressed on a keyboard and can be software or hardware devices.
(Multiple Choice)
4.8/5
(33)
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.9/5
(45)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
4.7/5
(40)
Briefly list some of the indications of a computer being infected by a virus.
(Essay)
4.8/5
(43)
John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.
(Multiple Choice)
4.8/5
(31)
_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.
(Multiple Choice)
4.8/5
(32)
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
(Multiple Choice)
4.8/5
(35)
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
(True/False)
4.9/5
(37)
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
(Multiple Choice)
4.7/5
(35)
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
(Multiple Choice)
4.9/5
(38)
_____is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
(Multiple Choice)
4.9/5
(34)
A _____is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.
(Multiple Choice)
4.9/5
(33)
In the context of data encryption, briefly describe asymmetric encryption.
(Essay)
4.8/5
(37)
In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.
(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)