Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Using MIS Study Set 2
Quiz 12: Information Systems Development
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
With ________, the sender and receiver transmit a message using different keys.
Question 82
Multiple Choice
________ are viruses that masquerade as useful programs or files.
Question 83
Multiple Choice
Secure Socket Layer is also known as ________.
Question 84
Multiple Choice
Packet-filtering firewalls ________.
Question 85
Multiple Choice
________ protect databases and other organizational data.
Question 86
Multiple Choice
A ________ examines each part of a message and determines whether to let that part pass.
Question 87
Multiple Choice
Which of the following statements is true with regard to human safeguards?
Question 88
Multiple Choice
Key escrow is a(n) ________.
Question 89
Multiple Choice
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
Question 90
Multiple Choice
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
Question 91
Multiple Choice
In asymmetric encryption, each site has a ________ for encoding messages.
Question 92
Multiple Choice
Which of the following statements is true of data administration?
Question 93
Multiple Choice
A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.
Question 94
Multiple Choice
A ________ is a type of virus that propagates using the Internet or other computer networks.
Question 95
Multiple Choice
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?