Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts100 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems77 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime95 Questions
Exam 7: The Internet,intranets,and Extranets75 Questions
Exam 8: E-Commerce95 Questions
Exam 9: Global Information Systems79 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems80 Questions
Exam 12: Management Support Systems95 Questions
Exam 13: Intelligent Information Systems97 Questions
Exam 14: Emerging Trends,technologies,and Applications98 Questions
Select questions type
A(n)____________________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Short Answer)
4.8/5
(43)
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
(True/False)
4.8/5
(42)
____________________ means that a system must prevent disclosing information to anyone who is not authorized to access it.
(Short Answer)
4.9/5
(56)
____ are hackers who specialize in unauthorized penetration of information systems.
(Multiple Choice)
4.7/5
(37)
A(n)____ is often used so remote users have a secure connection to the organization's network.
(Multiple Choice)
4.9/5
(41)
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
(True/False)
4.8/5
(45)
____ is a commonly used encryption protocol that manages transmission security on the Internet.
(Multiple Choice)
5.0/5
(40)
The main function of the ____ model is to provide information on security incidents,including information systems' vulnerabilities,viruses,and malicious programs.
(Multiple Choice)
4.8/5
(30)
Data encryption transforms data into a scrambled form called ____.
(Multiple Choice)
4.8/5
(33)
In ____ encryption,the same key is used to encrypt and decrypt the message.
(Multiple Choice)
4.8/5
(30)
____ means that a system must prevent disclosing information to anyone who is not authorized to access it.
(Multiple Choice)
4.8/5
(33)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)