Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview100 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts104 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,intranets,and Extranets101 Questions
Exam 8: E-Commerce101 Questions
Exam 9: Global Information Systems102 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems98 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems101 Questions
Exam 14: Emerging Trends,technologies,and Applications100 Questions
Select questions type
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
(True/False)
4.8/5
(39)
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
4.9/5
(37)
After examining an incoming packet,a firewall cannot reject that packet.
(True/False)
4.8/5
(35)
Describe the process of vein analysis in biometric security measures.
(Essay)
4.9/5
(40)
_____ use a physiological element to enhance security measures.
(Multiple Choice)
4.8/5
(39)
In the context of security,_____ means using "people skills"-such as being a good listener and assuming a friendly,unthreatening air-to trick others into revealing private information.
(Short Answer)
4.8/5
(28)
In the context of security,social engineering protects the integrity of information resources.
(True/False)
4.8/5
(34)
_____ is software that secretly gathers information about users while they browse the Web.
(Short Answer)
4.9/5
(37)
Part of ensuring integrity is identifying authorized users and granting them access privileges.
(True/False)
4.7/5
(40)
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
(Multiple Choice)
4.8/5
(41)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
4.8/5
(39)
_____ is a form of spyware that collects information about a user (without the user's consent) to determine which advertisements to display in the user's Web browser.
(Short Answer)
4.8/5
(30)
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
(Multiple Choice)
4.9/5
(36)
A (n) _____ travels from computer to computer in a network,but it does not usually erase data.
(Multiple Choice)
4.9/5
(36)
In _____ encryption,the same key is used to encrypt and decrypt a message.
(Multiple Choice)
4.8/5
(39)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)