Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts100 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems77 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime95 Questions
Exam 7: The Internet,intranets,and Extranets75 Questions
Exam 8: E-Commerce95 Questions
Exam 9: Global Information Systems79 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems80 Questions
Exam 12: Management Support Systems95 Questions
Exam 13: Intelligent Information Systems97 Questions
Exam 14: Emerging Trends,technologies,and Applications98 Questions
Select questions type
A ____ is a programming routine built into a system by its designer or programmer.
(Multiple Choice)
5.0/5
(35)
Typically,an organization leases the media used for a VPN on a(n)____ basis.
(Multiple Choice)
5.0/5
(37)
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
(True/False)
4.9/5
(36)
____________________ ensure availability in the event of a system failure by using a combination of hardware and software.
(Short Answer)
4.9/5
(45)
A(n)____________________ is software that acts as an intermediary between two systems.
(Short Answer)
4.8/5
(36)
____ take advantage of the human element of security systems.
(Multiple Choice)
4.9/5
(38)
Backup facilities should never be shared in an attempt to reduce costs.
(True/False)
4.9/5
(34)
Social engineering takes advantage of the human element of security systems.
(True/False)
4.8/5
(38)
A(n)____________________ consists of self-propagating program code that is triggered by a specified time or event.
(Short Answer)
4.8/5
(45)
____________________ is an attack that takes advantage of the human element of security systems.
(Short Answer)
4.8/5
(37)
List at least four types of intentional computer and network threats.
(Essay)
4.8/5
(45)
____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.
(Multiple Choice)
4.8/5
(40)
Social engineering is an example of an unintentional security threat.
(True/False)
4.9/5
(37)
In ____________________ encryption,the same key is used to encrypt and decrypt the message.
(Short Answer)
4.8/5
(40)
____ means that computers and networks are operating and authorized users can access the information they need.
(Multiple Choice)
4.8/5
(39)
How are computer viruses transmitted? Where do the most dangerous one come from and what viruses pose the most risk to network security?
(Essay)
4.7/5
(36)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)