100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS 200 Module 4 - 6 Exam Questions| Already Answered| GRADED A+ $7.99   Add to cart

Exam (elaborations)

MIS 200 Module 4 - 6 Exam Questions| Already Answered| GRADED A+

 2 views  0 purchase
  • Course
  • MIS 200
  • Institution
  • MIS 200

Viruses can only be transmitted through direct computer-to-computer contact. - ANSWER-false A(n) ____ is often used so remote users have a secure connection to the organization's network - ANSWER-virtual private network Confidentiality, integrity, and availability are collectively referred to as...

[Show more]

Preview 2 out of 9  pages

  • September 2, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MIS 200
  • MIS 200
avatar-seller
vincentvince9822
MIS 200 Module 4 - 6 Exam Questions|
Already Answered| GRADED A+
Viruses can only be transmitted through direct computer-to-computer contact. - ANSWER-false



A(n) ____ is often used so remote users have a secure connection to the organization's network -
ANSWER-virtual private network



Confidentiality, integrity, and availability are collectively referred to as the CIA triangle. - ANSWER-true



A ____ is a programming routine built into a system by its designer or programmer. - ANSWER-backdoor



An intrusion detection system can protect against both external and internal access. - ANSWER-true



Backup facilities should never be shared in an attempt to reduce costs. - ANSWER-false



____ refers to the accuracy of information resources within an organization. - ANSWER-Integrity



Black hats are also known as ethical hackers. - ANSWER-false



Level 2 security involves ____. - ANSWER-back-end systems



A ____ travels from computer to computer in a network, but it does not usually erase data. - ANSWER-
worm



A firewall cannot reject an incoming packet, but instead sends a warning to the network administrator. -
ANSWER-false



Level 3 security involves ____. - ANSWER-Corporate Network

, ____ are computer security experts who specialize in penetration testing and other testing methods to
ensure that a company's information systems are secure. - ANSWER-White Hats



An ideal password should be eight characters or longer. - ANSWER-true



Which of the following is a type of access control? - ANSWER-passwords



Social engineering takes advantage of the human element of security systems. - ANSWER-true



A logic bomb is a type of ____. - ANSWER-Trojan program



____ is the process of capturing and recording network traffic. - ANSWER-sniffing



Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.
- ANSWER-false



When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails. -
ANSWER-false



A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to
bombard a Web site with thousands of requests for information in a short period. - ANSWER-true



____ is a commonly used encryption protocol that manages transmission security on the Internet. -
ANSWER-secure sockets layer



Which of the following is a physical security measure? - ANSWER-electronic trackers



Part of ensuring integrity is identifying authorized users and granting them access privileges. - ANSWER-
true



Data encryption transforms data into a scrambled form called ciphertext. - ANSWER-true

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller vincentvince9822. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72964 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart