Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
MIS Study Set 3
Quiz 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
_____ is software that secretly gathers information about users while they browse the Web.
Question 62
Short Answer
A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
Question 63
Short Answer
_____ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.
Question 64
Multiple Choice
In _____ encryption,the same key is used to encrypt and decrypt a message.
Question 65
Short Answer
_____ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Question 66
Short Answer
A(n) _____ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
Question 67
Short Answer
When planning a comprehensive security system,the first step is designing _____,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.