Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview104 Questions
Exam 2: Computers: The Machines Behind Computing100 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts104 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources108 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,Intranets,and Extranets102 Questions
Exam 8: E-Commerce100 Questions
Exam 9: Global Information Systems107 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems105 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems99 Questions
Exam 14: Emerging Trends,Technologies,and Applications100 Questions
Select questions type
After examining an incoming packet,a firewall cannot reject that packet.
(True/False)
4.7/5
(35)
Which of the following is considered an intentional security threat?
(Multiple Choice)
4.7/5
(33)
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.8/5
(32)
Social engineering is an example of an unintentional security threat.
(True/False)
4.8/5
(39)
_____ encryption uses a public key known to everyone and a private key known only to the recipient.
(Multiple Choice)
4.8/5
(27)
When planning a comprehensive security system,the first step is designing _________,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
(Multiple Choice)
4.9/5
(25)
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
(Multiple Choice)
4.9/5
(32)
The Committee on National Security Systems (CNSS)proposed another model for evaluating information security known as the _____.
(Multiple Choice)
4.9/5
(36)
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
(True/False)
4.9/5
(29)
_________ is software that secretly gathers information about users while they browse the Web.
(Multiple Choice)
4.8/5
(39)
In the context of security threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
(Multiple Choice)
4.9/5
(33)
Explain the use of callback modems as a nonbiometric security measure.
(Essay)
4.9/5
(32)
_________ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
(Multiple Choice)
4.9/5
(41)
How is a sender notified of packet delivery using a packet-filtering firewall?
(Essay)
4.9/5
(44)
In the context of security,social engineering protects the integrity of information resources.
(True/False)
4.7/5
(40)
_________ are independent programs that can spread themselves without having to be attached to a host program.
(Multiple Choice)
4.8/5
(40)
Showing 61 - 80 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)