Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts100 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems77 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime95 Questions
Exam 7: The Internet,intranets,and Extranets75 Questions
Exam 8: E-Commerce95 Questions
Exam 9: Global Information Systems79 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems80 Questions
Exam 12: Management Support Systems95 Questions
Exam 13: Intelligent Information Systems97 Questions
Exam 14: Emerging Trends,technologies,and Applications98 Questions
Select questions type
Viruses can only be transmitted through direct computer-to-computer contact.
Free
(True/False)
4.9/5
(44)
Correct Answer:
False
If a drive in the RAID system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
How is the sender notified of packet delivery using a packet-filtering firewall?
Free
(Essay)
4.8/5
(33)
Correct Answer:
A packet-filtering firewall informs senders if packets are rejected but does nothing if packets are dropped; senders have to wait until their requests time out to learn that the packets they sent were not received.
A worm travels from computer to computer in a network,but it does not usually erase data.
(True/False)
4.9/5
(45)
____________________ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
(Short Answer)
4.8/5
(41)
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
(Multiple Choice)
4.7/5
(38)
A ____ travels from computer to computer in a network,but it does not usually erase data.
(Multiple Choice)
4.8/5
(34)
A(n)____________________ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
(Short Answer)
4.9/5
(29)
Data encryption transforms data into a scrambled form called ciphertext.
(True/False)
4.8/5
(38)
A(n)____________________ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.
(Short Answer)
4.8/5
(33)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
4.9/5
(40)
____ is the process of capturing and recording network traffic.
(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)