Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems Study Set 8
Quiz 8: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
Currently, the protocols used for secure information transfer over the Internet are
Question 62
Multiple Choice
A digital certificate system
Question 63
Short Answer
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.
Question 64
Multiple Choice
For 100% availability, online transaction processing requires
Question 65
Short Answer
Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.
Question 66
Multiple Choice
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
Question 67
Multiple Choice
Downtime refers to periods of time in which a
Question 68
Multiple Choice
Which of the following is the greatest threat that employees pose to an organization's information systems?
Question 69
Multiple Choice
Smaller firms may outsource some or many security functions to
Question 70
Multiple Choice
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Question 71
Short Answer
The intentional disruption of a Web site or information system is called ________.
Question 72
Short Answer
________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.