Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
MIS Study Set 3
Exam 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
Question 22
True/False
In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.
Question 23
True/False
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
Question 24
True/False
One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management.
Question 25
Multiple Choice
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
Question 26
Multiple Choice
A ________ is rented from a third party and usually contains telecommunication equipment.
Question 27
Essay
List the actions that a firewall can take after examining a packet.
Question 28
Multiple Choice
A(n) _____ network is often used so that remote users have a secure connection to an organization's network.
Question 29
Multiple Choice
In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.
Question 30
Multiple Choice
Before establishing a security program, organizations should __________.
Question 31
Multiple Choice
When developing a comprehensive security plan, which of the following steps is not recommended?
Question 32
Multiple Choice
Which statement is true of symmetric encryption?
Question 33
Multiple Choice
When planning a comprehensive security system, the first step is designing _____ , which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.