Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview104 Questions
Exam 2: Computers: The Machines Behind Computing100 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts104 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources108 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,Intranets,and Extranets102 Questions
Exam 8: E-Commerce100 Questions
Exam 9: Global Information Systems107 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems105 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems99 Questions
Exam 14: Emerging Trends,Technologies,and Applications100 Questions
Select questions type
In the context of security threats,_____ takes advantage of the human element of security systems.
(Multiple Choice)
4.7/5
(34)
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
(Multiple Choice)
4.7/5
(33)
In _____ encryption,the same key is used to encrypt and decrypt a message.
(Multiple Choice)
4.8/5
(35)
_____ is a computer crime that involves destroying or disrupting computer services.
(Multiple Choice)
5.0/5
(36)
How are identification (ID)badges used as a physical security measure against thefts?
(Short Answer)
4.7/5
(32)
A _________ consists of self-propagating program code that is triggered by a specified time or event.
(Multiple Choice)
4.8/5
(33)
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.
(Multiple Choice)
4.9/5
(30)
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
(True/False)
4.8/5
(32)
A(n)_________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Multiple Choice)
4.7/5
(40)
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
(Multiple Choice)
4.8/5
(39)
Which of the following is true of application-filtering firewalls?
(Multiple Choice)
4.8/5
(30)
The main function of Cyber Incident Response Capability (CIRC)is to _____.
(Multiple Choice)
4.9/5
(41)
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
(True/False)
4.9/5
(35)
In data encryption,a(n)_____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.
(Multiple Choice)
4.8/5
(35)
In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.
(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)