Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview103 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts105 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime105 Questions
Exam 7: The Internet,Intranets,and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends,Technologies,and Applications105 Questions
Select questions type
The three important aspects of computer and network security,confidentiality,integrity,and availability,are collectively referred to as the CIA triangle.
(True/False)
4.9/5
(48)
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.8/5
(38)
In the context of the common intentional security threats,which statement best describes a worm?
(Multiple Choice)
4.9/5
(36)
Level 1 security protects back-end systems to ensure confidentiality,accuracy,and integrity of data.
(True/False)
4.9/5
(34)
In the event of a network attack or intrusion,a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
(Multiple Choice)
4.8/5
(36)
_____,a biometric security measure,translates words into digital patterns,which are recorded and examined for tone and pitch.
(Multiple Choice)
4.9/5
(37)
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.
(Multiple Choice)
4.8/5
(34)
Which security measure uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others?
(Multiple Choice)
4.9/5
(26)
In the context of firewall as a nonbiometric security measure,a _____ is software that acts as an intermediary between two systems.
(Multiple Choice)
4.8/5
(36)
Which biometric security measure compares the length of each finger,the translucence of fingertips,and the webbing between fingers against stored data to verify users' identities?
(Multiple Choice)
4.8/5
(34)
In the context of fault-tolerant systems,describe uninterruptible power supply (UPS).
(Essay)
4.8/5
(34)
In the context of intentional computer and network threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
(Multiple Choice)
4.9/5
(36)
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
(Multiple Choice)
4.7/5
(32)
When an organization develops a comprehensive security plan,it should set up a security committee with representatives from all departments as well as upper management.
(True/False)
4.8/5
(33)
Discuss the functions of the Computer Emergency Response Team (CERT).
(Essay)
4.8/5
(28)
Showing 41 - 60 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)