Preview

Information Technology

Satisfactory Essays
Open Document
Open Document
760 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology
Question 126
1.
____ is the predecessor to the Internet.
Answer

a.
DES

b.
FIPS

c.
ARPANET

d.
NIST
1 points
Question 127
1.
A famous study entitled “Protection Analysis: Final Report” was published in ____.
Answer

a.
1868

b.
1978

c.
1988

d.
1998
1 points
Question 128
1.
____ was the first operating system to integrate security as its core functions.
Answer

a.
ARPANET

b.
UNIX

c.
MULTICS

d.
DOS
1 points
Question 129
1.
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Answer

a.
Standard

b.
Physical

c.
Object

d.
Personal
1 points
Question 130
1.
A(n) ____ attack is a hacker using a personal computer to break into a system.
Answer

a. indirect b. hardware c. software d. direct 1 points
Question 131
1.
A computer is the ____ of an attack when it is used to conduct the attack.
Answer

a. object b. subject c. target d. facilitator 1 points
Question 132
1.
____ of information is the quality or state of being genuine or original.
Answer

a.
Authenticity

b.
Confidentiality

c.
Spoofing

d.
Authorization
1 points
Question 133
1.
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.
Answer

a. hashing b. code c. hash d. key 1 points
Question 134
1.
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.
Answer

a.
IEEE 802.11(g)

b.
NSTISSI No. 4011

c.
ISO 17788

d.
NIST SP 800-12
1 points
Question 135
1.
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.

You May Also Find These Documents Helpful

  • Good Essays

    1. Go to http://www.cybercrime.gov. Go to the section on computer crimes press release. Select one of the cases randomly. Describe the type of attacker and the type of attack(s), according to the categories that are defined as in the textbook…

    • 542 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    | c. The protocol data unit (PDU) used in Layer 2 of the OSI model…

    • 1742 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    There are many objectives to the computer security that protects the information from any theft and natural disaster which allows information into the computer network. The computer technologies have become unwanted computer behavior and security strategies behavior. The computer technology which has security went it comes to logic. The security primary goals are the computer designing, applications programs with the type of security which most have restrictions to different types of program behaviors. The computer software has to be trusted and be able to security the software and be trustworthy for the database to run.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Better Essays

    "Network attack is usually defined as an intrusion on your network infrastructure that will first analyze your environment and collect information in order to exploit the existing open ports or vulnerabilities - this may include as well unauthorized access to your resources" (Symantec, 2013). We will first have to analyze the potential attacks we need to protect against, and the potential impact those attacks could have on the network. The majority of threats we will encounter are classified as viruses, hacks, and blended attacks.…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “By definition, security policy refers to clear, comprehensive, and well defines plans, rules and practices that regulate access to an organizations system and the information included in it. Good policy protects not only information and systems, but also individual employees and the organization as a whole. It also serves as a prominent statement to the outside world about the organizations commitment to security.” When developing a…

    • 2113 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Mis Midterm

    • 1958 Words
    • 8 Pages

    3) An information system can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support…

    • 1958 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    case study

    • 620 Words
    • 3 Pages

    b) Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3.Internet, Cell Phones or other devices are used to send or post text or images intended…

    • 3889 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    1. Computer output which is displayed on the screen of a terminal without a permanent copy is called—…

    • 616 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 4

    • 2246 Words
    • 9 Pages

    This chapter presents the analysis and interpretation of data to determine the feasibility of the proposed record keeping sytem for Department of Environment and Natural Resources.…

    • 2246 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Information Technology

    • 3937 Words
    • 16 Pages

    HTML web forms are a composition of buttons, checkboxes, and text input fields embedded inside of HTML documents with one goal in mind: to capture user input. By doing things such as providing fields for user data such as names, phone number, and email addresses, web forms give users the opportunity to interact directly with a webpage.…

    • 3937 Words
    • 16 Pages
    Better Essays