Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview100 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts104 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,intranets,and Extranets101 Questions
Exam 8: E-Commerce101 Questions
Exam 9: Global Information Systems102 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems98 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems101 Questions
Exam 14: Emerging Trends,technologies,and Applications100 Questions
Select questions type
An intrusion detection system (IDS) cannot prevent denial-of-service (DoS) attacks.
(True/False)
4.9/5
(45)
_____ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.
(Short Answer)
4.8/5
(27)
A(n) _____ is often used,so remote users have a secure connection to an organization's network.
(Multiple Choice)
4.9/5
(41)
How are computer viruses transmitted? Where do the most dangerous one come from and what viruses pose the most risk to national security?
(Essay)
4.9/5
(38)
Describe how uninterruptible power supply (UPS) is used as part of a comprehensive security system.
(Essay)
4.8/5
(43)
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
(True/False)
4.9/5
(38)
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
(True/False)
4.7/5
(40)
_____ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
(Short Answer)
4.8/5
(35)
_____ are independent programs that can spread themselves without having to be attached to a host program.
(Short Answer)
4.8/5
(36)
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.
(Multiple Choice)
4.7/5
(41)
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.
(Multiple Choice)
4.9/5
(38)
_____ is the process of capturing and recording network traffic.
(Multiple Choice)
4.9/5
(39)
How are identification (ID) badges used as a physical security measure against thefts?
(Essay)
4.9/5
(42)
Social engineering is an example of an unintentional security threat.
(True/False)
4.8/5
(43)
Social engineering is an attack that takes advantage of the backdoors in security systems.
(True/False)
4.8/5
(38)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)