Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
MIS Study Set 1
Quiz 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
Question 22
Multiple Choice
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
Question 23
Multiple Choice
__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
Question 24
Multiple Choice
Which of the following statements best describes spyware?
Question 25
Multiple Choice
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
Question 26
Multiple Choice
When planning a comprehensive security system, the first step is designing__________, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
Question 27
Multiple Choice
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
Question 28
Multiple Choice
In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.
Question 29
Multiple Choice
When a computer is infected by a virus, _____.
Question 30
Multiple Choice
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.
Question 31
Multiple Choice
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
Question 32
Multiple Choice
Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
Question 33
Multiple Choice
_____ is also known as secret key encryption.
Question 34
Multiple Choice
__________is used to encrypt the data sent through a virtual private network (VPN) .
Question 35
Multiple Choice
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
Question 36
Multiple Choice
The process of capturing and recording network traffic is referred to as _____.
Question 37
Multiple Choice
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.