Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems
Quiz 8: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 161
Short Answer
Popular IM applications for consumers do not use a ________ for text messages,so they can be intercepted and read by outsiders during transmission over the public Internet.
Question 162
Short Answer
________ examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet,examining individual packets in isolation.
Question 163
Short Answer
________ refers to the ability to know that a person is who he or she claims to be.
Question 164
Short Answer
Comprehensive security management products,with tools for firewalls,VPNs,intrusion detection systems,and more,are called ________ systems.
Question 165
Short Answer
________ consists of all the policies and procedures a company uses to prevent improper entry to systems by unauthorized insiders and outsiders.
Question 166
Short Answer
Malicious software programs referred to as ________ include a variety of threats such as computer viruses,worms,and Trojan horses.
Question 167
Short Answer
A(n)________ examines the firm's overall security environment as well as the controls governing individual information systems.
Question 168
Short Answer
Smartphones share the same ________ weaknesses as other Internet devices and are vulnerable to malicious software and penetration from outsiders.
Question 169
Short Answer
________ feature full-time monitoring tools placed at the most vulnerable points or "hot spots" of corporate networks to detect and deter intruders continually.
Question 170
Short Answer
________ is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
Question 171
Short Answer
A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
Question 172
Short Answer
________ is designed to check computer systems and drives for the presence of computer viruses.
Question 173
Short Answer
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Question 174
Short Answer
________ encryption uses two keys: one shared (or public)and one private.
Question 175
Short Answer
Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control.
Question 176
Short Answer
________ computer systems contain redundant hardware,software,and power supply components that create an environment that provides continuous,uninterrupted service.
Question 177
Short Answer
________ is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.