Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing79 Questions
Exam 3: Database Systems, Data Warehouses, and Data Marts80 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems80 Questions
Exam 5: Protecting Information Resources84 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime80 Questions
Exam 7: The Internet, Intranets, and Extranets77 Questions
Exam 8: E-Commerce80 Questions
Exam 9: Global Information Systems83 Questions
Exam 10: Building Successful Information Systems80 Questions
Exam 11: Enterprise Systems81 Questions
Exam 12: Management Support Systems80 Questions
Exam 13: Intelligent Information Systems80 Questions
Exam 14: Emerging Trends, Technologies, and Applications80 Questions
Select questions type
In the context of intentional computer and network threats, social engineers protects the integrity of information resources.
(True/False)
4.7/5
(37)
A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Multiple Choice)
4.9/5
(42)
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
(Multiple Choice)
4.8/5
(37)
Which of the following is a type of access control used to protect systems from unauthorized access?
(Multiple Choice)
4.9/5
(34)
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
(Multiple Choice)
4.7/5
(32)
If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
(True/False)
4.9/5
(35)
In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
(Multiple Choice)
4.9/5
(38)
In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.
(True/False)
4.8/5
(33)
The cost of setting up a virtual private network (VPN) is usually high.
(True/False)
4.8/5
(30)
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
(Multiple Choice)
4.9/5
(41)
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
4.8/5
(35)
In the context of the common intentional security threats, which of the following statements best describes a worm?
(Multiple Choice)
4.8/5
(31)
A__________consists of self-propagating program code that is triggered by a specified time or event.
(Multiple Choice)
4.9/5
(35)
Which of the following statements is true of asymmetric encryption?
(Multiple Choice)
4.7/5
(38)
An intrusion detection system (IDS) can protect networks against both external and internal access.
(True/False)
4.9/5
(41)
When planning a comprehensive security system, the first step is designing__________, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
(Multiple Choice)
4.9/5
(36)
Showing 41 - 60 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)