Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview80 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts100 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems77 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime95 Questions
Exam 7: The Internet,intranets,and Extranets75 Questions
Exam 8: E-Commerce95 Questions
Exam 9: Global Information Systems79 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems80 Questions
Exam 12: Management Support Systems95 Questions
Exam 13: Intelligent Information Systems97 Questions
Exam 14: Emerging Trends,technologies,and Applications98 Questions
Select questions type
A proxy server acts as an intermediary between network users and the Internet.
(True/False)
4.9/5
(40)
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
(True/False)
4.7/5
(38)
Describe some of the steps that users should take to guard against data theft and data loss.
(Essay)
4.8/5
(35)
____ ensures data security and integrity over public networks,such as the Internet.
(Multiple Choice)
4.9/5
(34)
____________________ are inexperienced,usually young hackers who use programs that others have developed to attack computer and network systems.
(Short Answer)
4.9/5
(41)
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
(True/False)
4.8/5
(41)
The cost of setting up a virtual private network is usually high.
(True/False)
4.7/5
(34)
Explain the use of callback modems as a nonbiometric security measure.
(Essay)
4.8/5
(34)
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
(Multiple Choice)
4.9/5
(35)
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
4.8/5
(35)
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
(True/False)
4.9/5
(37)
____ security measures use a physiological element to enhance security measures.
(Multiple Choice)
4.8/5
(38)
____________________ are independent programs that can spread themselves without having to be attached to a host program.
(Short Answer)
4.7/5
(36)
Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.
(Multiple Choice)
4.8/5
(29)
Part of ensuring integrity is identifying authorized users and granting them access privileges.
(True/False)
4.9/5
(36)
____________________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
(Short Answer)
4.7/5
(32)
A ____ is an inexperienced,usually young hacker who uses programs that others have developed to attack computer and network systems.
(Multiple Choice)
4.7/5
(31)
A firewall cannot reject an incoming packet,but instead sends a warning to the network administrator.
(True/False)
4.8/5
(39)
Social engineering techniques are easily detectable because they involve threatening employees with physical violence.
(True/False)
4.8/5
(38)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)