Deck 17: Computer Technology and Information Security Issues

ملء الشاشة (f)
exit full mode
سؤال
There are four common elements to computer systems: Input; Processing; Storage; and Output.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The four common elements of any type of computer system are:

A) Hardware, software, firmware and power.
B) Hardware, software, input and output.
C) input, processing, storage and output.
D) input, processing, output and users.
سؤال
Essentially,the CIO,CISO and CSO have a shared security responsibility which consists of protecting the:

A) Confidentiality, integrity and availability of company information
B) The physical security of computing assets only
C) The physical security of computing assets and confidentiality of information only.
D) Confidentiality and availability of company information
سؤال
In large organizations,only the Chief Information Officer (CIO)is responsible for computer security.
سؤال
Spam,cookies and viruses are the only problems on the world wide web (www)that concern security.
سؤال
A continuing trend suggests security will become more reliant on new security related technologies supported by the very computers security organizations have been charged to protect.
سؤال
A computer virus is best described as:

A) A program that causes sever damage to a computer system
B) Worms, Hostile Applets, Bombs and Trapdoors
C) A hidden program that may be remotely activated
D) Any hidden computer code that copies itself to other programs
سؤال
Computer security only involves protecting computers and information from theft.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/8
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Computer Technology and Information Security Issues
1
There are four common elements to computer systems: Input; Processing; Storage; and Output.
True
2
The four common elements of any type of computer system are:

A) Hardware, software, firmware and power.
B) Hardware, software, input and output.
C) input, processing, storage and output.
D) input, processing, output and users.
C
3
Essentially,the CIO,CISO and CSO have a shared security responsibility which consists of protecting the:

A) Confidentiality, integrity and availability of company information
B) The physical security of computing assets only
C) The physical security of computing assets and confidentiality of information only.
D) Confidentiality and availability of company information
A
4
In large organizations,only the Chief Information Officer (CIO)is responsible for computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
5
Spam,cookies and viruses are the only problems on the world wide web (www)that concern security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
6
A continuing trend suggests security will become more reliant on new security related technologies supported by the very computers security organizations have been charged to protect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
7
A computer virus is best described as:

A) A program that causes sever damage to a computer system
B) Worms, Hostile Applets, Bombs and Trapdoors
C) A hidden program that may be remotely activated
D) Any hidden computer code that copies itself to other programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
8
Computer security only involves protecting computers and information from theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.