Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
MIS Study Set 3
Exam 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
Code Red, Melissa, and Sasser are examples of _____ .
Question 102
Essay
Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster.
Question 103
True/False
Social engineering is an attack that takes advantage of the backdoors in security systems.
Question 104
Essay
Briefly list some of the indications of a computer being infected by a virus.
Question 105
Essay
Briefly discuss how a worm can disrupt a computer or a network.
Question 106
Multiple Choice
Which federal law requires IT professionals to test the effectiveness of security measures protecting a company's data and vital records?
Question 107
Multiple Choice
Which of the following is not considered part of a comprehensive security plan?
Question 108
True/False
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Question 109
Multiple Choice
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
Question 110
Multiple Choice
A _____ is a type of an intentional computer and network threat.
Question 111
Multiple Choice
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Question 112
Multiple Choice
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
Question 113
True/False
In the event of disaster, organizations should document all actions taken to regain normality.
Question 114
Multiple Choice
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.