Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
MIS6
Exam 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
_____ encryption usually works better for public networks,such as the Internet.
Question 42
Multiple Choice
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.
Question 43
Multiple Choice
_________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Question 44
Multiple Choice
To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.
Question 45
Multiple Choice
A _____ travels from computer to computer in a network but it does not usually erase data.
Question 46
True/False
The cost of setting up a virtual private network (VPN)is usually high.
Question 47
Essay
What is the McCumber cube?
Question 48
Multiple Choice
In data encryption,the https indicates a safe HTTP connection over _____.
Question 49
True/False
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Question 50
Multiple Choice
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.