Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
MIS Study Set 3
Quiz 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.
Question 62
Multiple Choice
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
Question 63
Multiple Choice
Which statement is true of symmetric encryption?
Question 64
Multiple Choice
Which statement is true of asymmetric encryption?
Question 65
Multiple Choice
Data sent through a virtual private network (VPN) can be encrypted using the _____.
Question 66
Multiple Choice
_____ is an example of antispyware software.
Question 67
Multiple Choice
_____, a more recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.
Question 68
Multiple Choice
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
Question 69
Multiple Choice
_____ is also known as secret key encryption.
Question 70
Multiple Choice
_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.
Question 71
Multiple Choice
The main function of Cyber Incident Response Capability (CIRC) is to _____.
Question 72
Multiple Choice
A(n) _____ network is often used so that remote users have a secure connection to an organization's network.
Question 73
Multiple Choice
In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.
Question 74
Multiple Choice
_____ is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
Question 75
Multiple Choice
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.