Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management Information Systems
Quiz 14: Risks, security, and Disaster Recovery
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Short Answer
A(n)____________________ is software that is programmed to cause damage at a specified time to specific applications and data files.
Question 42
Short Answer
____________________ are constraints and other restrictions imposed on a user or a system,and they can be used to secure systems against risks or to reduce damage caused to systems,applications,and data.
Question 43
Multiple Choice
Managers should focus on the asset they must protect,which in most cases is ____,not applications.
Question 44
Multiple Choice
When tapping communications,law enforcement agencies need the cooperation of a third party,such as a telephone company or a(n) ____.
Question 45
Multiple Choice
CIOs often find the tasks of earmarking funds for ____ difficult because they cannot show the return on investment (ROI) of such planning.
Question 46
Essay
____________________ occurs when a Web site receives an overwhelming number of information requests,such as merely logging on to a site.
Question 47
Short Answer
____________________,the time during which ISs or data are not available in the course of conducting business,has become a dreaded situation for almost every business worldwide.
Question 48
Multiple Choice
Employees are especially annoyed when they have to remember a different password for every system they use,a simpler solution is an approach called ____.
Question 49
Multiple Choice
____,those without which the business cannot conduct its operations,are given the highest priority by the disaster recovery coordinator.
Question 50
Multiple Choice
The ____,as it is popularly known,gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.
Question 51
Multiple Choice
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
Question 52
Short Answer
Some viruses are called ____________________,analogous to the destructive gift given to the ancient Trojans.
Question 53
Short Answer
____________________ are total losses of electrical power.
Question 54
Short Answer
Once criminals have a person's identifying details,such as a Social Security number,driver's license number,or credit-card number,they can pretend to be this person,which is a crime called ____________________.