Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview103 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts105 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime105 Questions
Exam 7: The Internet,Intranets,and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends,Technologies,and Applications105 Questions
Select questions type
Which form of text needs to be unscrambled using a decryption key?
(Multiple Choice)
4.8/5
(42)
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
(True/False)
4.8/5
(30)
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
(True/False)
4.9/5
(40)
The cost of setting up a virtual private network (VPN)is usually high.
(True/False)
4.8/5
(27)
In a level 2 security system,_____ must be protected to ensure confidentiality,accuracy,and integrity of data.
(Multiple Choice)
4.8/5
(39)
Social engineering is an attack that takes advantage of the backdoors in security systems.
(True/False)
4.7/5
(37)
If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.
(True/False)
4.8/5
(34)
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
(Multiple Choice)
4.9/5
(37)
In the context of computer crimes and attacks,the difference between phishing and spear phishing is that:
(Multiple Choice)
4.8/5
(31)
The main drawback of an intrusion detection system (IDS)is its inability to prevent denial-of-service (DoS)attacks.
(True/False)
4.7/5
(38)
Data sent through a virtual private network (VPN)can be encrypted using the _____.
(Multiple Choice)
4.8/5
(40)
In the context of data encryption,briefly describe asymmetric encryption.
(Essay)
4.9/5
(42)
In the context of computer and network security,_____ means a quick recovery in the event of a system failure or disaster.
(Multiple Choice)
4.9/5
(32)
A(n)_____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
(Multiple Choice)
4.8/5
(33)
In contrast to pharming,phishing involves hijacking an official Web site address by hacking a Domain Name System server.
(True/False)
4.8/5
(35)
Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks.
(Essay)
4.8/5
(32)
A level 1 security system is used to protect _____ against unauthorized access.
(Multiple Choice)
4.7/5
(30)
Showing 61 - 80 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)