100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS 320 NDSU FINAL EXAM QUESTIONS AND ANSWERS NEW UPDATE $12.99   Add to cart

Exam (elaborations)

MIS 320 NDSU FINAL EXAM QUESTIONS AND ANSWERS NEW UPDATE

 4 views  0 purchase
  • Course
  • MIS 320 NDSU
  • Institution
  • MIS 320 NDSU

MIS 320 NDSU FINAL EXAM QUESTIONS AND ANSWERS NEW UPDATE To minimize the invasion of privacy, _____. - Answer-users should be able to review their records and correct any inaccuracies An intrusion detection system can protect networks against both external and internal access. T/F - Answer-true...

[Show more]

Preview 2 out of 7  pages

  • August 27, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MIS 320 NDSU
  • MIS 320 NDSU
avatar-seller
Scholarsstudyguide
MIS 320 NDSU FINAL EXAM QUESTIONS
AND ANSWERS NEW UPDATE
To minimize the invasion of privacy, _____. - Answer-users should be able to review
their records and correct any inaccuracies

An intrusion detection system can protect networks against both external and internal
access. T/F - Answer-true

Social engineering is an attack that takes advantage of the backdoors in security
systems. T/F - Answer-false

__is a form of spyware that records the keys pressed on a keyboard and can be
software or hardware devices. - Answer-Keystroke loggers

____is an attempt to gain access to a network by posing as an authorized user in order
to find sensitive information, such as passwords and credit card information. - Answer-
spoofing

Which of the following statements is true of a worm? - Answer-It is an independent
program that can spread itself without attaching itself to a host program.

In the event of a network attack or intrusion, a _____ lists the tasks that must be
performed by the organization to restore damaged data and equipment. - Answer-
disaster recovery plan

___ is a type of data encryption that enables users of the Internet to securely and
privately exchange data through the use of a pair of keys that is obtained from a trusted
authority and shared through that authority. - Answer-Asymmetric key encryption

__ is a biometric security measure - Answer-fingerprint

The lock in a browser address bar indicates a safe web connection over _____. -
Answer-Secure Sockets Layer

In _____, one node is in charge of selecting the path for all packets. - Answer-
centralized routing

____ is the amount of data that can be transferred from one point to another in one
second. - Answer-bandwidth

, Identify a true statement about the different forms of sender and receiver devices. -
Answer-Thin clients have no processing power.

____ refers to the electronic transfer of data from one location to another. - Answer-
Data communication

Communication media that use an antenna for transmitting data through air or water are
called _____. - Answer-radiated media

__ refers to rules of conduct that govern data communication. - Answer-protocol

Typically, a narrowband carries more data than a broadband. T/F - Answer-false

Computer indicators such as 0s and 1s used for instructions are signals.
T/F - Answer-true

In data communication, _____ refers to integrating voice, video, and other data to
create multimedia information that can be used for decision making. - Answer-
convergence

___ check to see what links are on the user's Web page and make sure they work; if a
link is broken, they identify it and include this information as part of the data about that
page. - Answer-crawlers

A(n) _____is a secure network that uses the internet and web technologies to connect
intranets of business partners so that communication between organizations is possible.
- Answer-Extranet

Which of the following is a type of interorganizational system? - Answer-extranet

The protocol that is used for internet telephony is _____. - Answer-Voice over internet
protocol

_are indexes of information, based on keywords embedded in documents, that allow
search engines to find what Internet users are looking for. - Answer-Directories

There are multiple internet backbones, and they are connected at network access
points. T/F - Answer-true

Which of the following indicates the top-level domain for the universal resource locator
(URL), http://www.csub.edu? - Answer-.edu

An intranet application or service that uses an organization's computer network. T/F -
Answer-true

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72964 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart