Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview100 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts104 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,intranets,and Extranets101 Questions
Exam 8: E-Commerce101 Questions
Exam 9: Global Information Systems102 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems98 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems101 Questions
Exam 14: Emerging Trends,technologies,and Applications100 Questions
Select questions type
A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Short Answer)
4.8/5
(41)
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
(True/False)
4.8/5
(36)
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
(True/False)
4.9/5
(39)
_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
(Short Answer)
4.8/5
(34)
An intrusion detection system (IDS) can protect networks against both external and internal access.
(True/False)
4.9/5
(40)
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
(True/False)
4.7/5
(34)
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
(Multiple Choice)
4.8/5
(21)
A _____ is a programming routine built into a system by its designer or programmer.
(Multiple Choice)
4.8/5
(37)
The cost of setting up a virtual private network (VPN) is usually high.
(True/False)
4.7/5
(44)
Which of the following is considered an intentional security threat?
(Multiple Choice)
4.8/5
(27)
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.
(Multiple Choice)
4.9/5
(41)
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
(True/False)
4.9/5
(32)
When planning a comprehensive security system,the first step is designing _____,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
(Short Answer)
4.9/5
(41)
Corner bolts are an expensive way to secure a computer to a desktop or a counter.
(True/False)
4.9/5
(38)
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
(Multiple Choice)
4.9/5
(38)
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
(True/False)
4.9/5
(34)
_____ encryption uses a public key known to everyone and a private key known only to the recipient.
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)