Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview103 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts105 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime105 Questions
Exam 7: The Internet,Intranets,and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends,Technologies,and Applications105 Questions
Select questions type
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
(True/False)
4.8/5
(32)
In the context of intentional computer and network threats,describe how blended threats work.
(Essay)
4.9/5
(30)
Application-filtering firewalls are less expensive than packet-filtering firewalls.
(True/False)
4.8/5
(39)
In the context of biometric security measures,briefly describe some biometric devices and measures.
(Essay)
4.9/5
(29)
_____ is used to encrypt the data sent through a virtual private network (VPN).
(Multiple Choice)
4.9/5
(33)
In the context of intentional security threats,_____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
(Multiple Choice)
4.9/5
(25)
Describe the three levels of security in a comprehensive security system.
(Essay)
4.8/5
(34)
A level 3 security system focuses on protecting the _____ against intrusion,denial-of-service attacks,and unauthorized access.
(Multiple Choice)
4.8/5
(38)
_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
(Multiple Choice)
4.8/5
(25)
_____ is a computer crime that involves destroying or disrupting computer services.
(Multiple Choice)
4.8/5
(42)
_____ uses a public key known to everyone and a private key known only to the recipient.
(Multiple Choice)
4.7/5
(36)
_____ is a form of spyware that collects information about a user (without the user's consent)to determine which commercials to display in the user's Web browser.
(Multiple Choice)
4.8/5
(37)
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
(Multiple Choice)
4.8/5
(41)
In the context of access controls,briefly explain the guidelines that need to be followed to increase the effectiveness of passwords.
(Essay)
4.8/5
(41)
Showing 21 - 40 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)