Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview100 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts104 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,intranets,and Extranets101 Questions
Exam 8: E-Commerce101 Questions
Exam 9: Global Information Systems102 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems98 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems101 Questions
Exam 14: Emerging Trends,technologies,and Applications100 Questions
Select questions type
A(n) _____ consists of self-propagating program code that is triggered by a specified time or event.
(Short Answer)
5.0/5
(39)
_____ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
(Short Answer)
4.9/5
(27)
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
(True/False)
5.0/5
(41)
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
(True/False)
4.8/5
(33)
_____ ensures data security and integrity over public networks,such as the Internet.
(Multiple Choice)
4.9/5
(31)
Backup facilities should never be shared in an attempt to reduce costs.
(True/False)
4.9/5
(37)
Which of the following is a type of access control used to protect systems from unauthorized access?
(Multiple Choice)
4.9/5
(37)
_____ take advantage of the human element of security systems.
(Multiple Choice)
4.8/5
(33)
_____ is a computer crime that involves destroying or disrupting computer services.
(Multiple Choice)
4.9/5
(44)
Data encryption transforms data into a scrambled form called ciphertext.
(True/False)
4.8/5
(37)
Explain the use of callback modems as a nonbiometric security measure.
(Essay)
4.9/5
(36)
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
(True/False)
4.9/5
(38)
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.
(Multiple Choice)
4.8/5
(37)
How is a sender notified of packet delivery using a packet-filtering firewall?
(Essay)
4.9/5
(43)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)