Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
MIS Study Set 3
Exam 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
True/False
Trojan programs replicate themselves as viruses and worms do.
Question 62
True/False
An intrusion detection system (IDS) cannot prevent denial-of-service (DoS) attacks.
Question 63
Short Answer
_____ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.
Question 64
Multiple Choice
A(n) _____ is often used,so remote users have a secure connection to an organization's network.
Question 65
Essay
How are computer viruses transmitted? Where do the most dangerous one come from and what viruses pose the most risk to national security?
Question 66
Essay
What is shoulder surfing? Provide an example.
Question 67
Essay
How does a worm disrupt computing services?
Question 68
Essay
Describe how uninterruptible power supply (UPS) is used as part of a comprehensive security system.
Question 69
True/False
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Question 70
True/False
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Question 71
Short Answer
_____ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Question 72
Multiple Choice
Which of the following is a biometric security measure?
Question 73
Short Answer
_____ are independent programs that can spread themselves without having to be attached to a host program.
Question 74
Multiple Choice
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.
Question 75
Multiple Choice
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.