Deck 17: Computer Technology and Information Security Issues
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/8
العب
ملء الشاشة (f)
Deck 17: Computer Technology and Information Security Issues
1
There are four common elements to computer systems: Input; Processing; Storage; and Output.
True
2
The four common elements of any type of computer system are:
A) Hardware, software, firmware and power.
B) Hardware, software, input and output.
C) input, processing, storage and output.
D) input, processing, output and users.
A) Hardware, software, firmware and power.
B) Hardware, software, input and output.
C) input, processing, storage and output.
D) input, processing, output and users.
C
3
Essentially,the CIO,CISO and CSO have a shared security responsibility which consists of protecting the:
A) Confidentiality, integrity and availability of company information
B) The physical security of computing assets only
C) The physical security of computing assets and confidentiality of information only.
D) Confidentiality and availability of company information
A) Confidentiality, integrity and availability of company information
B) The physical security of computing assets only
C) The physical security of computing assets and confidentiality of information only.
D) Confidentiality and availability of company information
A
4
In large organizations,only the Chief Information Officer (CIO)is responsible for computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
5
Spam,cookies and viruses are the only problems on the world wide web (www)that concern security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
6
A continuing trend suggests security will become more reliant on new security related technologies supported by the very computers security organizations have been charged to protect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
7
A computer virus is best described as:
A) A program that causes sever damage to a computer system
B) Worms, Hostile Applets, Bombs and Trapdoors
C) A hidden program that may be remotely activated
D) Any hidden computer code that copies itself to other programs
A) A program that causes sever damage to a computer system
B) Worms, Hostile Applets, Bombs and Trapdoors
C) A hidden program that may be remotely activated
D) Any hidden computer code that copies itself to other programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
8
Computer security only involves protecting computers and information from theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck