Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview104 Questions
Exam 2: Computers: The Machines Behind Computing100 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts104 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources108 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,Intranets,and Extranets102 Questions
Exam 8: E-Commerce100 Questions
Exam 9: Global Information Systems107 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems105 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems99 Questions
Exam 14: Emerging Trends,Technologies,and Applications100 Questions
Select questions type
Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
An intrusion detection system (IDS)can protect networks against both external and internal access.
Free
(True/False)
4.9/5
(31)
Correct Answer:
True
Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
A
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
(True/False)
4.9/5
(43)
Social engineering is an attack that takes advantage of the backdoors in security systems.
(True/False)
4.7/5
(37)
A(n)_________ program contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.
(Multiple Choice)
5.0/5
(35)
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
(Multiple Choice)
4.7/5
(42)
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
(True/False)
4.8/5
(37)
In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.
(True/False)
4.9/5
(23)
An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.
(True/False)
4.8/5
(32)
_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.
(Multiple Choice)
4.8/5
(35)
In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.
(Multiple Choice)
4.8/5
(33)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
5.0/5
(35)
Which of the following indicates that a computer might be affected by a virus?
(Multiple Choice)
4.7/5
(38)
How are computer viruses transmitted? Where do the most dangerous ones come from and what viruses pose the most risk to national security?
(Essay)
4.9/5
(38)
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
(Multiple Choice)
4.9/5
(27)
Showing 1 - 20 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)