Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing79 Questions
Exam 3: Database Systems, Data Warehouses, and Data Marts80 Questions
Exam 4: Personal, Legal, Ethical, and Organizational Issues of Information Systems80 Questions
Exam 5: Protecting Information Resources84 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime80 Questions
Exam 7: The Internet, Intranets, and Extranets77 Questions
Exam 8: E-Commerce80 Questions
Exam 9: Global Information Systems83 Questions
Exam 10: Building Successful Information Systems80 Questions
Exam 11: Enterprise Systems81 Questions
Exam 12: Management Support Systems80 Questions
Exam 13: Intelligent Information Systems80 Questions
Exam 14: Emerging Trends, Technologies, and Applications80 Questions
Select questions type
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
(Multiple Choice)
4.8/5
(40)
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
(Multiple Choice)
4.8/5
(33)
A(n)__________contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
(Multiple Choice)
4.8/5
(41)
A__________is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.
(Multiple Choice)
4.9/5
(36)
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
(True/False)
4.8/5
(36)
__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
(Multiple Choice)
4.9/5
(39)
When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
(True/False)
4.9/5
(39)
_____ is a computer crime that involves destroying or disrupting computer services.
(Multiple Choice)
4.9/5
(43)
Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?
(Multiple Choice)
4.8/5
(46)
__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
(Multiple Choice)
4.8/5
(33)
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?
(Multiple Choice)
4.7/5
(49)
_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.
(Multiple Choice)
4.7/5
(35)
The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.
(True/False)
4.8/5
(46)
The process of capturing and recording network traffic is referred to as _____.
(Multiple Choice)
4.8/5
(34)
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
(Multiple Choice)
4.8/5
(35)
_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.
(Multiple Choice)
4.9/5
(34)
__________is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.
(Multiple Choice)
4.9/5
(38)
Showing 61 - 80 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)