Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview104 Questions
Exam 2: Computers: The Machines Behind Computing100 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts104 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources108 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,Intranets,and Extranets102 Questions
Exam 8: E-Commerce100 Questions
Exam 9: Global Information Systems107 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems105 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems99 Questions
Exam 14: Emerging Trends,Technologies,and Applications100 Questions
Select questions type
_________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.
(Multiple Choice)
4.8/5
(33)
Data sent through a virtual private network (VPN)can be encrypted using the _____.
(Multiple Choice)
4.7/5
(37)
In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
4.8/5
(46)
_________ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
(Multiple Choice)
4.8/5
(31)
In the context of the CIA triangle,part of ensuring integrity is identifying authorized users and granting them access privileges.
(True/False)
4.8/5
(30)
A level 1 security system is used to protect _____ against unauthorized access.
(Multiple Choice)
4.9/5
(34)
_________,a biometric security measure,translates words into digital patterns,which are recorded and examined for tone and pitch.
(Multiple Choice)
4.9/5
(30)
Describe the process of vein analysis in biometric security measures.
(Essay)
5.0/5
(25)
Which of the following is a type of access control used to protect systems from unauthorized access?
(Multiple Choice)
4.8/5
(37)
In the context of security threats,_________ means using "people skills"-such as being a good listener and assuming a friendly,unthreatening air-to trick others into revealing private information.
(Multiple Choice)
4.7/5
(36)
Describe how uninterruptible power supply (UPS)is used a part of a comprehensive security system.
(Essay)
4.9/5
(32)
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.
(Multiple Choice)
4.8/5
(41)
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
(True/False)
4.8/5
(25)
A _________ threat is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
(Multiple Choice)
4.9/5
(39)
Showing 81 - 100 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)