Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing79 Questions
Exam 3: Database Systems, Data Warehouses, and Data Marts80 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems80 Questions
Exam 5: Protecting Information Resources84 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime80 Questions
Exam 7: The Internet, Intranets, and Extranets77 Questions
Exam 8: E-Commerce80 Questions
Exam 9: Global Information Systems83 Questions
Exam 10: Building Successful Information Systems80 Questions
Exam 11: Enterprise Systems81 Questions
Exam 12: Management Support Systems80 Questions
Exam 13: Intelligent Information Systems80 Questions
Exam 14: Emerging Trends, Technologies, and Applications80 Questions
Select questions type
Which of the following is a biometric security measure?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
D
When a computer is infected by a virus, _____.
Free
(Multiple Choice)
4.7/5
(47)
Correct Answer:
C
When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.9/5
(39)
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
(Multiple Choice)
4.9/5
(28)
Which of the following statements is true of application-filtering firewalls?
(Multiple Choice)
4.8/5
(46)
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
(Multiple Choice)
4.8/5
(37)
__________is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
(Multiple Choice)
4.9/5
(34)
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
(Multiple Choice)
5.0/5
(36)
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
(Multiple Choice)
4.7/5
(34)
In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.
(True/False)
4.8/5
(46)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
4.8/5
(38)
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
(True/False)
4.8/5
(34)
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
(Multiple Choice)
4.7/5
(46)
_____ uses a public key known to everyone and a private key known only to the recipient.
(Multiple Choice)
4.9/5
(25)
A level 1 security system is used to protect _____ against unauthorized access.
(Multiple Choice)
4.8/5
(34)
Social engineering is an attack that takes advantage of the backdoors in security systems.
(True/False)
4.8/5
(37)
When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.
(True/False)
4.8/5
(45)
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)