Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Fundamentals of Information Systems Study Set 1
Quiz 9: The Personal and Social Effects of Computers
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
Your ex-colleague was apprehended based on the "Fraud and Related Activity in Connection with Access Devices Statute" Act. He was caught using unauthorized or stolen _________.
Question 62
Short Answer
____ is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
Question 63
Short Answer
Suppose you wish to inspect the packets of data that are coming in from the Internet into your organization's network. You should use _______.
Question 64
Short Answer
The purpose of _____ is to use email messages to make the recipients reveal personal data.
Question 65
Short Answer
_____ is software that generates and grades tests that humans can pass; however, all but the most sophisticated computer programs cannot.
Question 66
Short Answer
The concept of _______, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
Question 67
Short Answer
A ______ defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements.
Question 68
Short Answer
The primary security threat for mobile devices continues to be ______ of the device.
Question 69
Short Answer
You are starting to see unexpected messages on the screen. Some programs that used to work do not work any longer. You find some key files missing. Your computer has been infected by a(n) _________.
Question 70
Short Answer
It is crucial that antivirus software be continually _____ with the latest virus signatures.
Question 71
Short Answer
Some businesses outsource their security management to MSSPs. MSSP stands for ________.
Question 72
Short Answer
_______ try, on a daily basis, to gain unauthorized access to a number of important and sensitive sites, such as the computers at the British, French, Israeli, and United States foreign intelligence agencies.