Exam 5: Protecting Information Resources
Exam 1: Information Systems: An Overview103 Questions
Exam 2: Computers: The Machines Behind Computing105 Questions
Exam 3: Database Systems,Data Warehouses,and Data Marts105 Questions
Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems105 Questions
Exam 5: Protecting Information Resources109 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime105 Questions
Exam 7: The Internet,Intranets,and Extranets105 Questions
Exam 8: E-Commerce105 Questions
Exam 9: Global Information Systems109 Questions
Exam 10: Building Successful Information Systems105 Questions
Exam 11: Enterprise Systems106 Questions
Exam 12: Management Support Systems105 Questions
Exam 13: Intelligent Information Systems105 Questions
Exam 14: Emerging Trends,Technologies,and Applications105 Questions
Select questions type
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.
(Multiple Choice)
4.8/5
(30)
Explain the use of callback modems as a nonbiometric security measure.
(Essay)
4.9/5
(36)
In the context of intentional computer and network threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
(Multiple Choice)
4.8/5
(34)
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
(True/False)
4.9/5
(38)
_____,a recent cryptographic protocol,ensures data security and integrity over public networks,such as the Internet.
(Multiple Choice)
4.8/5
(41)
In the context of computer and network security,a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
(Multiple Choice)
4.7/5
(37)
In some instances,after examining an incoming packet,a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.
(True/False)
4.9/5
(31)
The process of capturing and recording network traffic is referred to as _____.
(Multiple Choice)
4.8/5
(29)
_____ are usually placed in front of a firewall and can identify attack signatures,trace patterns,generate alarms for a network administrator,and cause routers to terminate connections with suspicious sources.
(Multiple Choice)
4.7/5
(35)
_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.
(Multiple Choice)
4.9/5
(30)
_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.
(Multiple Choice)
4.7/5
(30)
In data encryption,the https in a browser address bar indicates a safe HTTP connection over _____.
(Multiple Choice)
4.7/5
(36)
In the context of intentional computer and network threats,social engineers protects the integrity of information resources.
(True/False)
4.8/5
(29)
A _____ consists of self-propagating program code that is triggered by a specified time or event.
(Multiple Choice)
4.7/5
(28)
Briefly list some of the indications of a computer being infected by a virus.
(Essay)
4.8/5
(37)
Showing 81 - 100 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)