Viruses can only be transmitted through direct computer-to-computer contact. - ANSWER-false
A(n) ____ is often used so remote users have a secure connection to the organization's network -
ANSWER-virtual private network
Confidentiality, integrity, and availability are collectively referred to as...
MIS 200 Module 4 - 6 Exam Questions|
Already Answered| GRADED A+
Viruses can only be transmitted through direct computer-to-computer contact. - ANSWER-false
A(n) ____ is often used so remote users have a secure connection to the organization's network -
ANSWER-virtual private network
Confidentiality, integrity, and availability are collectively referred to as the CIA triangle. - ANSWER-true
A ____ is a programming routine built into a system by its designer or programmer. - ANSWER-backdoor
An intrusion detection system can protect against both external and internal access. - ANSWER-true
Backup facilities should never be shared in an attempt to reduce costs. - ANSWER-false
____ refers to the accuracy of information resources within an organization. - ANSWER-Integrity
Black hats are also known as ethical hackers. - ANSWER-false
Level 2 security involves ____. - ANSWER-back-end systems
A ____ travels from computer to computer in a network, but it does not usually erase data. - ANSWER-
worm
A firewall cannot reject an incoming packet, but instead sends a warning to the network administrator. -
ANSWER-false
, ____ are computer security experts who specialize in penetration testing and other testing methods to
ensure that a company's information systems are secure. - ANSWER-White Hats
An ideal password should be eight characters or longer. - ANSWER-true
Which of the following is a type of access control? - ANSWER-passwords
Social engineering takes advantage of the human element of security systems. - ANSWER-true
A logic bomb is a type of ____. - ANSWER-Trojan program
____ is the process of capturing and recording network traffic. - ANSWER-sniffing
Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.
- ANSWER-false
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails. -
ANSWER-false
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to
bombard a Web site with thousands of requests for information in a short period. - ANSWER-true
____ is a commonly used encryption protocol that manages transmission security on the Internet. -
ANSWER-secure sockets layer
Which of the following is a physical security measure? - ANSWER-electronic trackers
Part of ensuring integrity is identifying authorized users and granting them access privileges. - ANSWER-
true
Data encryption transforms data into a scrambled form called ciphertext. - ANSWER-true
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller vincentvince9822. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.