Preview

Information Technology

Satisfactory Essays
Open Document
Open Document
760 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology
Question 126
1.
____ is the predecessor to the Internet.
Answer

a.
DES

b.
FIPS

c.
ARPANET

d.
NIST
1 points
Question 127
1.
A famous study entitled “Protection Analysis: Final Report” was published in ____.
Answer

a.
1868

b.
1978

c.
1988

d.
1998
1 points
Question 128
1.
____ was the first operating system to integrate security as its core functions.
Answer

a.
ARPANET

b.
UNIX

c.
MULTICS

d.
DOS
1 points
Question 129
1.
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Answer

a.
Standard

b.
Physical

c.
Object

d.
Personal
1 points
Question 130
1.
A(n) ____ attack is a hacker using a personal computer to break into a system.
Answer

a. indirect b. hardware c. software d. direct 1 points
Question 131
1.
A computer is the ____ of an attack when it is used to conduct the attack.
Answer

a. object b. subject c. target d. facilitator 1 points
Question 132
1.
____ of information is the quality or state of being genuine or original.
Answer

a.
Authenticity

b.
Confidentiality

c.
Spoofing

d.
Authorization
1 points
Question 133
1.
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.
Answer

a. hashing b. code c. hash d. key 1 points
Question 134
1.
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.
Answer

a.
IEEE 802.11(g)

b.
NSTISSI No. 4011

c.
ISO 17788

d.
NIST SP 800-12
1 points
Question 135
1.
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    Name: ________________________ Class: ___________________ Date: __________ CS11-Online-Chapter09 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Computer crime is sometimes referred to as ____. a. hacking c. b. cybercrime d.…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    | c. The protocol data unit (PDU) used in Layer 2 of the OSI model…

    • 1742 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    There are many objectives to the computer security that protects the information from any theft and natural disaster which allows information into the computer network. The computer technologies have become unwanted computer behavior and security strategies behavior. The computer technology which has security went it comes to logic. The security primary goals are the computer designing, applications programs with the type of security which most have restrictions to different types of program behaviors. The computer software has to be trusted and be able to security the software and be trustworthy for the database to run.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    1. Go to http://www.cybercrime.gov. Go to the section on computer crimes press release. Select one of the cases randomly. Describe the type of attacker and the type of attack(s), according to the categories that are defined as in the textbook…

    • 542 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    case study

    • 620 Words
    • 3 Pages

    b) Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Mis Midterm

    • 1958 Words
    • 8 Pages

    3) An information system can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support…

    • 1958 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    3.Internet, Cell Phones or other devices are used to send or post text or images intended…

    • 3889 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    1. Computer output which is displayed on the screen of a terminal without a permanent copy is called—…

    • 616 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 4

    • 2246 Words
    • 9 Pages

    This chapter presents the analysis and interpretation of data to determine the feasibility of the proposed record keeping sytem for Department of Environment and Natural Resources.…

    • 2246 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Information Technology

    • 3937 Words
    • 16 Pages

    HTML web forms are a composition of buttons, checkboxes, and text input fields embedded inside of HTML documents with one goal in mind: to capture user input. By doing things such as providing fields for user data such as names, phone number, and email addresses, web forms give users the opportunity to interact directly with a webpage.…

    • 3937 Words
    • 16 Pages
    Better Essays