Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems
Quiz 8: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Short Answer
__________________________ refers to the policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems
Question 82
Multiple Choice
An ___________________________ examines the firm's overall security environment as well as controls governing individual information systems.
Question 83
Multiple Choice
___________________________ ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.
Question 84
Short Answer
________ refers to the ability to know that a person is who he or she claims to be.
Question 85
Short Answer
In a _______________________________ attack hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network.
Question 86
Short Answer
The intentional disruption of a Web site or information system is called ________.
Question 87
Short Answer
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Question 88
Short Answer
When errors are discovered in software programs,the sources of the errors are found and eliminated through a process called ________.
Question 89
Short Answer
________ is the scientific collection,examination,authentication,preservation,and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.