Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing79 Questions
Exam 3: Database Systems, Data Warehouses, and Data Marts80 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems80 Questions
Exam 5: Protecting Information Resources84 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime80 Questions
Exam 7: The Internet, Intranets, and Extranets77 Questions
Exam 8: E-Commerce80 Questions
Exam 9: Global Information Systems83 Questions
Exam 10: Building Successful Information Systems80 Questions
Exam 11: Enterprise Systems81 Questions
Exam 12: Management Support Systems80 Questions
Exam 13: Intelligent Information Systems80 Questions
Exam 14: Emerging Trends, Technologies, and Applications80 Questions
Select questions type
Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
(Multiple Choice)
4.9/5
(33)
In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.
(True/False)
4.9/5
(42)
A(n) _____ is often used so that remote users have a secure connection to an organization's network.
(Multiple Choice)
4.9/5
(32)
Data sent through a virtual private network (VPN) can be encrypted using the _____.
(Multiple Choice)
4.8/5
(37)
Viruses can be transmitted through a network or through e-mail attachments.
(True/False)
4.7/5
(37)
In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.
(Multiple Choice)
4.8/5
(39)
__________monitor and record the keys pressed on a keyboard and can be software or hardware devices.
(Multiple Choice)
4.9/5
(26)
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
(Multiple Choice)
4.8/5
(29)
Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.
(True/False)
4.8/5
(40)
__________, a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
(Multiple Choice)
4.9/5
(41)
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
(Multiple Choice)
4.8/5
(44)
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
(True/False)
4.8/5
(31)
A _____ is a type of an intentional computer and network threat.
(Multiple Choice)
4.9/5
(35)
The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.
(True/False)
4.8/5
(37)
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.
(Multiple Choice)
4.9/5
(36)
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
(Multiple Choice)
4.9/5
(40)
_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)