Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts100 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems77 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime95 Questions
Exam 7: The Internet,intranets,and Extranets75 Questions
Exam 8: E-Commerce95 Questions
Exam 9: Global Information Systems79 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems80 Questions
Exam 12: Management Support Systems95 Questions
Exam 13: Intelligent Information Systems97 Questions
Exam 14: Emerging Trends,technologies,and Applications98 Questions
Select questions type
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.
(Multiple Choice)
5.0/5
(50)
An intrusion detection system can protect against both external and internal access.
(True/False)
4.8/5
(36)
A(n)____ is software that acts as an intermediary between two systems.
(Multiple Choice)
4.7/5
(32)
____________________ means that computers and networks are operating and authorized users can access the information they need.
(Short Answer)
4.8/5
(38)
In symmetric encryption,the same key is used to encrypt and decrypt the message.
(True/False)
4.8/5
(31)
Which of the following is considered an intentional threat?
(Multiple Choice)
4.8/5
(30)
What are the actions that a firewall might take after examining a packet?
(Essay)
4.8/5
(29)
____ encryption uses a public key known to everyone and a private key known only to the recipient.
(Multiple Choice)
4.8/5
(35)
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
(True/False)
4.9/5
(36)
The ____________________ biometric security method translates words into digital patterns,which are recorded and examined for tone and pitch.
(Short Answer)
4.8/5
(41)
____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.9/5
(46)
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
(True/False)
4.8/5
(40)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)