Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview104 Questions
Exam 2: Computers: The Machines Behind Computing100 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts104 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources108 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,Intranets,and Extranets102 Questions
Exam 8: E-Commerce100 Questions
Exam 9: Global Information Systems107 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems105 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems99 Questions
Exam 14: Emerging Trends,Technologies,and Applications100 Questions
Select questions type
_____ encryption usually works better for public networks,such as the Internet.
(Multiple Choice)
4.9/5
(37)
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.
(Multiple Choice)
4.9/5
(27)
_________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
(Multiple Choice)
4.8/5
(31)
To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.
(Multiple Choice)
4.9/5
(34)
A _____ travels from computer to computer in a network but it does not usually erase data.
(Multiple Choice)
4.9/5
(34)
The cost of setting up a virtual private network (VPN)is usually high.
(True/False)
4.9/5
(36)
In data encryption,the https indicates a safe HTTP connection over _____.
(Multiple Choice)
4.8/5
(38)
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
(True/False)
5.0/5
(33)
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.
(Multiple Choice)
4.7/5
(29)
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.
(Multiple Choice)
4.8/5
(32)
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
(True/False)
4.8/5
(38)
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
(True/False)
4.7/5
(36)
A level 3 security system focuses on protecting _____ against intrusion,denial-of-service attacks,and unauthorized access.
(Multiple Choice)
4.9/5
(30)
_____ is the process of capturing and recording network traffic.
(Multiple Choice)
4.9/5
(35)
In data encryption,_____ ensures data security and integrity over public networks,such as the Internet.
(Multiple Choice)
4.8/5
(40)
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
(True/False)
5.0/5
(36)
_________ is a form of spyware that collects information about a user (without the user's consent)to determine which advertisements to display in the user's Web browser.
(Multiple Choice)
4.8/5
(32)
A(n)_____ is often used so remote users have a secure connection to an organization's network.
(Multiple Choice)
4.8/5
(32)
Showing 41 - 60 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)