Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview208 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems, Data Warehouses and Data Marts105 Questions
Exam 4: Personal, Legal, Ethical and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication105 Questions
Exam 7: The Internet, Intranets, and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends, Technologies, and Applications105 Questions
Select questions type
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?
(Multiple Choice)
4.9/5
(36)
List the different types of intentional computer and network security threats.
(Essay)
4.8/5
(26)
_____is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
(Multiple Choice)
4.8/5
(29)
A(n) _____contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
(Multiple Choice)
4.9/5
(41)
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
(Multiple Choice)
4.7/5
(27)
Which of the following is a type of access control used to protect systems from unauthorized access?
(Multiple Choice)
4.8/5
(34)
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
(Multiple Choice)
4.9/5
(35)
Showing 101 - 109 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)