Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems
Quiz 8: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 181
Essay
Bob wants to use encryption tools in his firm but he is not sure if he should use public key or private key encryption.He really doesn't understand the differences between the two.Describe the two types of encryption for Bob.
Question 182
Essay
Define a fault-tolerant computer system and a high-availability computer system.How do they differ? When would each be used?
Question 183
Essay
What is a digital certificate? How does it work?
Question 184
Short Answer
The ________ worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book.Infected 15 to 29 percent of all business PCs,causing $300 million to $600 million in damage.
Question 185
Essay
Robert is in charge of security and control at his financial trading firm.He needs to approach management about investing large sums of money to the area of security and control.He knows that it will be a hard sell to this group because they are very focused on sales revenue and this is not directly related to that.Give Robert some arguments that he might use to convince the board to invest these funds in security and control.
Question 186
Essay
Sally is the CEO of a chain of health clinics in Ontario.She is growing more and more concerned about the security of records in her company.She is wondering about the legal and regulatory requirements for electronic record management in Canada.What would you advise Sally about the legal and regulatory requirements for electronic record management in Canada?
Question 187
Short Answer
The ________ worm uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely.
Question 188
Essay
You have just been hired as a security consultant by MegaMalls Inc.,a national chain of retail malls,to make sure that the security of their information systems is up to par.Outline the steps you will take to achieve this.