Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview208 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems, Data Warehouses and Data Marts105 Questions
Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication105 Questions
Exam 7: The Internet, Intranets, and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends, Technologies, and Applications105 Questions
Select questions type
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
(Multiple Choice)
4.8/5
(36)
_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.
(Multiple Choice)
4.8/5
(39)
A(n) _____ is often used so that remote users have a secure connection to an organization's network.
(Multiple Choice)
4.7/5
(42)
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
(Multiple Choice)
4.7/5
(34)
_____, a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
(Multiple Choice)
4.8/5
(33)
_____is used to encrypt the data sent through a virtual private network (VPN).
(Multiple Choice)
4.9/5
(44)
If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
(True/False)
4.7/5
(36)
In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.
(True/False)
4.8/5
(46)
Discuss the functions of the Computer Emergency Response Team (CERT).
(Essay)
4.9/5
(37)
Which of the following statements is true of symmetric encryption?
(Multiple Choice)
4.9/5
(37)
Social engineering is an attack that takes advantage of the backdoors in security systems.
(True/False)
4.9/5
(34)
Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks.
(Essay)
4.9/5
(39)
The main function of Cyber Incident Response Capability (CIRC) is to _____.
(Multiple Choice)
4.8/5
(28)
A _____ is a type of an intentional computer and network threat.
(Multiple Choice)
4.9/5
(39)
The cost of setting up a virtual private network (VPN) is usually high.
(True/False)
4.8/5
(31)
Showing 81 - 100 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)