Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
MIS Study Set 3
Quiz 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
Question 22
Multiple Choice
Spoofing happens when:
Question 23
Multiple Choice
In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.
Question 24
True/False
An organization's comprehensive security plan should include procedures for installing software patches and updates on a regular basis.
Question 25
Multiple Choice
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
Question 26
Multiple Choice
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
Question 27
Multiple Choice
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
Question 28
Multiple Choice
A level 1 security system is used to protect _____ against unauthorized access.
Question 29
Multiple Choice
Which statement is true of phishing?
Question 30
Multiple Choice
In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:
Question 31
Multiple Choice
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
Question 32
Multiple Choice
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
Question 33
Multiple Choice
_____ is a computer crime that involves destroying or disrupting computer services.
Question 34
True/False
One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management.
Question 35
Multiple Choice
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
Question 36
Multiple Choice
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.