Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
MIS Study Set 1
Quiz 5: Protecting Information Resources
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
Question 22
Multiple Choice
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
Question 23
Multiple Choice
__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
Question 24
Multiple Choice
Which of the following statements best describes spyware?
Question 25
Multiple Choice
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
Question 26
Multiple Choice
When planning a comprehensive security system, the first step is designing__________, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.