MCQs > IT & Programming > Computer Science MCQs > Information System and Security MCQs

Information System and Security MCQ

A digital certificate associates _____.

Answer

Correct Answer: The user's identity with his public key

Note: This Question is unanswered, help us to find answer for this one

_______________ enables you to prevent a party from denying a previous statement or action.

Answer

Correct Answer: Nonrepudiation

Note: This Question is unanswered, help us to find answer for this one

Transmitted data stored locally are referred to as __________ .

Answer

Correct Answer: Data at rest

Note: This Question is unanswered, help us to find answer for this one

The successor to 3des is the ____________________ encryption standard.

Answer

Correct Answer: Advanced

Note: This Question is unanswered, help us to find answer for this one

The number of possible keys to a cipher is a ___________.

Answer

Correct Answer: Keyspace.

Note: This Question is unanswered, help us to find answer for this one

The __________ approach is vulnerable to man-in-the-middle attacks.

Answer

Correct Answer: Anonymous Diffie-Hellman

Note: This Question is unanswered, help us to find answer for this one

On wireless networks, ____ attacks are commonly done by attackers setting up an evil twin.

Answer

Correct Answer: Man-in-the-middle

Note: This Question is unanswered, help us to find answer for this one

Its essential to match your organizations required __________ with its security structure.

Answer

Correct Answer: Permission level

Note: This Question is unanswered, help us to find answer for this one

Collecting in-depth information about an individual is known as ____.

Answer

Correct Answer: Electronic profiling

Note: This Question is unanswered, help us to find answer for this one

Each of these is a reason why adware is scorned except _____.

Answer

Correct Answer: It displays the attackers programming skills

Note: This Question is unanswered, help us to find answer for this one

Each of the following can be classified as an "insider" except _______.

Answer

Correct Answer: Cybercriminals

Note: This Question is unanswered, help us to find answer for this one

Digital signatures should be created using processes and products that are based on the __________.

Answer

Correct Answer: DSS

Note: This Question is unanswered, help us to find answer for this one

A centralized directory of digital certificates is called a(n) _____.

Answer

Correct Answer: Certificate Repository (CR)

Note: This Question is unanswered, help us to find answer for this one

A ____ virus mutates with every infection, thus making them difficult to locate.

Answer

Correct Answer: Polymorphic

Note: This Question is unanswered, help us to find answer for this one

____________________ may be defined as confidence in or reliance on another person or entity.

Answer

Correct Answer: Trust

Note: This Question is unanswered, help us to find answer for this one

_________ ensures that any changes to a production system are tested, documented, and approved.

Answer

Correct Answer: Change control

Note: This Question is unanswered, help us to find answer for this one

Clerical workers using computers for word-processing tasks is an example of job _____.

Answer

Correct Answer: Up grading

Note: This Question is unanswered, help us to find answer for this one

For longer video clips, the time in the cue is written in the form _____.

Answer

Correct Answer: Hh:mm:ss.ms

Note: This Question is unanswered, help us to find answer for this one

The sscp exam consists of ____ multiple-choice questions, and must be completed within three hours.

Answer

Correct Answer: 125

Note: This Question is unanswered, help us to find answer for this one

Symmetric algorithms are typically known for their ability to maintain _______________.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

For computer access, a false ________ means that a legitimate user is denied access to a resource.

Answer

Correct Answer: Rejection

Note: This Question is unanswered, help us to find answer for this one

Developing a seamless integration of databases with the internet is something called a(n) ______.

Answer

Correct Answer: Semantic web

Note: This Question is unanswered, help us to find answer for this one

Government agencies have not supported cloud computing due to the lack of ____.

Answer

Correct Answer: Privacy and security

Note: This Question is unanswered, help us to find answer for this one

Commerce service providers are also called _____ service providers.

Answer

Correct Answer: Managed

Note: This Question is unanswered, help us to find answer for this one

According to the disruptive growth engine, executive leadership will allow a firm to ________.

Answer

Correct Answer: Gain credibility and to bridge sustaining and disruptive product development

Note: This Question is unanswered, help us to find answer for this one

A systems request form should not ____.

Answer

Correct Answer: Have complex instructions

Note: This Question is unanswered, help us to find answer for this one

A social bookmarking site is dedicated to providing all of the following except ________.

Answer

Correct Answer: To reconnect with colleagues for business progress

Note: This Question is unanswered, help us to find answer for this one

A project triangle shows three legs: _____.

Answer

Correct Answer: Project cost, scope, and time

Note: This Question is unanswered, help us to find answer for this one

A professional who specializes in analyzing and designing business systems is called a(n) ____.

Answer

Correct Answer: Systems analyst

Note: This Question is unanswered, help us to find answer for this one

A popular technique for investigating causes and effects is called a _____ diagram.

Answer

Correct Answer: Fishbone

Note: This Question is unanswered, help us to find answer for this one

A major challenge in the successful implementation of an erp system is _____.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

________ conversion is the riskiest type of conversion process.

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

______ compares data with a set of rules or values to determine if the data meets certain criteria.

Answer

Correct Answer: Validation

Note: This Question is unanswered, help us to find answer for this one

The hashed message authentication code (hmac) _____.

Answer

Correct Answer: Encrypts the key and the message

Note: This Question is unanswered, help us to find answer for this one

Radius and tacacs belong to a category of protocols known as aaa (____).

Answer

Correct Answer: Authentication, authorization, and accounting

Note: This Question is unanswered, help us to find answer for this one

The most reliable nmap scan is ____________ scan.

Answer

Correct Answer: Connect

Note: This Question is unanswered, help us to find answer for this one

Digital certificates can be used for each of these except _____.

Answer

Correct Answer: To verify the authenticity of the Registration Authorizer

Note: This Question is unanswered, help us to find answer for this one

In ipsec ____________________ mode, only the ip data is encrypted, not the ip headers.

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

In a ____ attack, a person redirects or captures secure transmissions as they occur.

Answer

Correct Answer: Man in the middle

Note: This Question is unanswered, help us to find answer for this one

In ____, a hacker forges name server records to falsify his hosts identity.

Answer

Correct Answer: DNS Spoofing

Note: This Question is unanswered, help us to find answer for this one

Aes implements a block cipher called the rijndael block cipher. _________________________

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

__________ was developed by phil zimmermann and uses the idea cipher for message encoding.

Answer

Correct Answer: Pretty Good Privacy (PGP)

Note: This Question is unanswered, help us to find answer for this one

__________ are encrypted messages that can be mathematically proven to be authentic.

Answer

Correct Answer: Digital signature

Note: This Question is unanswered, help us to find answer for this one

____ is a method of encrypting tcp/ip transmissions above the network layer.

Answer

Correct Answer: SSL

Note: This Question is unanswered, help us to find answer for this one

Ultraportables conforming to intels standards can be marketed as ____.

Answer

Correct Answer: Ultrabooks

Note: This Question is unanswered, help us to find answer for this one

An executive information system (eis) is a branch of ____.

Answer

Correct Answer: DSS

Note: This Question is unanswered, help us to find answer for this one

__________ is the first function in the propagation phase for a network worm.

Answer

Correct Answer: Fingerprinting

Note: This Question is unanswered, help us to find answer for this one

The umls ___________ contains the terminology, classification and code system standards.

Answer

Correct Answer: Metathesaurus

Note: This Question is unanswered, help us to find answer for this one

The primary disadvantage of centralized database systems is ________.

Answer

Correct Answer: Transmission delay when users are geo-dispersed

Note: This Question is unanswered, help us to find answer for this one

The information about invoices to customers is tracked by ____ system.

Answer

Correct Answer: Transaction processing system

Note: This Question is unanswered, help us to find answer for this one

The ________ houses the power supply, memory, and drive bays of the computer.

Answer

Correct Answer: System unit

Note: This Question is unanswered, help us to find answer for this one

The firewall device must never be accessible directly from the ____________________ network.

Answer

Correct Answer: Public

Note: This Question is unanswered, help us to find answer for this one

The architecture of a(n) ____________________ firewall provides a dmz.

Answer

Correct Answer: Screened Subnet

Note: This Question is unanswered, help us to find answer for this one

In an information systems department, the enterprise systems subunit is responsible for ________.

Answer

Correct Answer: Developing, installing, maintaining, and overseeing the organization's mission-critical software applications

Note: This Question is unanswered, help us to find answer for this one

Hybrid notebook-tablet computers are also called convertible tablets or ____.

Answer

Correct Answer: 2-in-1 computers

Note: This Question is unanswered, help us to find answer for this one

____ is a valuable resource for additional information on building and staffing csirts.

Answer

Correct Answer: NIST

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is like a locked door on your computer.

Answer

Correct Answer: Firewall

Note: This Question is unanswered, help us to find answer for this one

The us-cert incident reporting system is used to ____.

Answer

Correct Answer: ​alert the Department of Homeland Security about information security incidents

Note: This Question is unanswered, help us to find answer for this one

Hardware-based security controls include ____.

Answer

Correct Answer: None of the above.

Note: This Question is unanswered, help us to find answer for this one

Activity trackers and smartwatches are two types of ______ devices.

Answer

Correct Answer: Wearable

Note: This Question is unanswered, help us to find answer for this one

Each of the following is true regarding a keylogger except _______.

Answer

Correct Answer: Hardware keyloggers are installed between the keyboard connector and computer keyboard or USB port

Note: This Question is unanswered, help us to find answer for this one

The threats to information security are _____, and the greatest threat is _____.

Answer

Correct Answer: Increasing; human

Note: This Question is unanswered, help us to find answer for this one

One of the first vendor-specific certification programs was offered by ____.

Answer

Correct Answer: Novell

Note: This Question is unanswered, help us to find answer for this one

In dblc, the phase after the database initial study is _____.

Answer

Correct Answer: Database design

Note: This Question is unanswered, help us to find answer for this one

Data in a multidimensional database is organized in a ________ format

Answer

Correct Answer: Cube

Note: This Question is unanswered, help us to find answer for this one

Behavioral models of management see managers as being ________ than does the classical model.

Answer

Correct Answer: More informal

Note: This Question is unanswered, help us to find answer for this one

A(n) ________ check determines whether a required field such as lastname was filled in.

Answer

Correct Answer: Completeness

Note: This Question is unanswered, help us to find answer for this one

A tool used by installers to remove the case from a desktop pc is a ____.

Answer

Correct Answer: Nut driver.

Note: This Question is unanswered, help us to find answer for this one

Transaction data for a crm system might be gathered using ____.

Answer

Correct Answer: Grocery store loyalty cards

Note: This Question is unanswered, help us to find answer for this one

In a data flow diagram (dfd), a spontaneous generation process is a process that has _____.

Answer

Correct Answer: ​no input

Note: This Question is unanswered, help us to find answer for this one

A(n) _____ is a group of similar objects.

Answer

Correct Answer: Class

Note: This Question is unanswered, help us to find answer for this one

When ppp is used over an ethernet network, it is known as ________________.

Answer

Correct Answer: Point to Point over Ethernet

Note: This Question is unanswered, help us to find answer for this one

A ________ is an encryption key used to encrypt other keys before transmitting them.

Answer

Correct Answer: Key-encrypting key

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ attack is a hacker using a personal computer to break into a system.

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

The cto heads the ________ group in the is department.

Answer

Correct Answer: Technology.

Note: This Question is unanswered, help us to find answer for this one

Unlike an executive information system, a decision support system (dss) ____.

Answer

Correct Answer: Helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models

Note: This Question is unanswered, help us to find answer for this one

The microsoft office suite is a tempting target for viruses because ___________.

Answer

Correct Answer: It is designed so that programmers can access its internal objects

Note: This Question is unanswered, help us to find answer for this one

Changing the design and content of a website to improve its ranking in serps is called ______.

Answer

Correct Answer:

Note: This Question is unanswered, help us to find answer for this one

Is the result of optimizing operations and supplier processes.

Answer

Correct Answer: Cost Reduction

Note: This Question is unanswered, help us to find answer for this one

A(n) ________ is a dedicated computer in a client/server environment that hosts a dbms.

Answer

Correct Answer: Database server

Note: This Question is unanswered, help us to find answer for this one

A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.

Answer

Correct Answer: Business ecosystem

Note: This Question is unanswered, help us to find answer for this one

________ is the security guarantee that people who intercept messages cannot read them.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

Qr or ________ codes let any piece of print host a link to online information

Answer

Correct Answer: Quick response

Note: This Question is unanswered, help us to find answer for this one

Online analytical processing is the foundation of the ________ module in erp.

Answer

Correct Answer: Business intelligence

Note: This Question is unanswered, help us to find answer for this one

In fisma, ________ is done internally by the organization.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

The ____ view involves how data is stored on and retrieved from storage media.

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

________ is our normal sense of the world around us enhanced with digital information.

Answer

Correct Answer: Augmented reality

Note: This Question is unanswered, help us to find answer for this one

____ is the formal term for combining two or more columns to form a primary key.

Answer

Correct Answer: Concatenation

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is an extension of an organization?s intranet into cloud computing.

Answer

Correct Answer: Private cloud.

Note: This Question is unanswered, help us to find answer for this one

A subform may be added to a main form by using the subform/subreport tool or by using the ____.

Answer

Correct Answer: Subform Wizard

Note: This Question is unanswered, help us to find answer for this one

A high-end graphics card is sometimes called a ____ card.

Answer

Correct Answer: Video

Note: This Question is unanswered, help us to find answer for this one

In mpls, the ________ adds the label to the packet.

Answer

Correct Answer: First label-switching router

Note: This Question is unanswered, help us to find answer for this one

Supply chain execution ________.

Answer

Correct Answer: Involves the management of information flow

Note: This Question is unanswered, help us to find answer for this one

E-hubs are more ________ than private industrial networks.

Answer

Correct Answer: Transaction-oriented

Note: This Question is unanswered, help us to find answer for this one

In biometric, a match occurs when a ________ meets the decision criteria.

Answer

Correct Answer: Match index

Note: This Question is unanswered, help us to find answer for this one

Sophisticated attacks often are difficult to identify amid the ""noise"" of many ________ attacks.

Answer

Correct Answer: Script kiddie

Note: This Question is unanswered, help us to find answer for this one

Smartphones use ________ technology, allowing users to perform several functions with one device.

Answer

Correct Answer: Convergence or integration

Note: This Question is unanswered, help us to find answer for this one

Porter defined value as the ________.

Answer

Correct Answer: Amount of money that a customer is willing to pay for an offering

Note: This Question is unanswered, help us to find answer for this one

Benchmark tests on competing products can be used to select ____.

Answer

Correct Answer: Both hardware and software products

Note: This Question is unanswered, help us to find answer for this one

During the early 1980s, ____ word processors competed for market share.

Answer

Correct Answer: Several

Note: This Question is unanswered, help us to find answer for this one

During the 1980s, incompatible computer products resulted in ____.

Answer

Correct Answer: Excessive spare parts inventories, a lack of transferable employee skills, increased support costs.

Note: This Question is unanswered, help us to find answer for this one

_________ is the most difficult, radical, lengthy, and comprehensive strategy.

Answer

Correct Answer: BPR

Note: This Question is unanswered, help us to find answer for this one

To request a web page or other resource located on the internet, use its ____.

Answer

Correct Answer: Both

Note: This Question is unanswered, help us to find answer for this one

Products and services designed to target a specific industry are known as _____.

Answer

Correct Answer: None of these

Note: This Question is unanswered, help us to find answer for this one

A comparison is correct only when the correct ____ and operator are used.

Answer

Correct Answer: Operands

Note: This Question is unanswered, help us to find answer for this one

Ipv6 was introduced when ipv4 ________.

Answer

Correct Answer: No longer had enough unique addresses

Note: This Question is unanswered, help us to find answer for this one

The use of certificate authorities to associate public keys with certain users is known as ____.

Answer

Correct Answer: PKI

Note: This Question is unanswered, help us to find answer for this one

The need for collaboration is greatest for ________ decisions.

Answer

Correct Answer: Strategic

Note: This Question is unanswered, help us to find answer for this one

One characteristic of a structured problem is that _____.

Answer

Correct Answer: It is straightforward, requiring known facts and relationships

Note: This Question is unanswered, help us to find answer for this one

In the context of the data component of an information system, external data sources include _____.

Answer

Correct Answer: Labor statistics

Note: This Question is unanswered, help us to find answer for this one

Amazon.com uses ____ to provide customized book recommendations based on past purchases.

Answer

Correct Answer: Cookies

Note: This Question is unanswered, help us to find answer for this one

A computer ____ is a person who has been hired to break into a computer and steal information.

Answer

Correct Answer: Spy

Note: This Question is unanswered, help us to find answer for this one

In a cost-benefit analysis, operating costs are ____ costs.

Answer

Correct Answer: Ongoing

Note: This Question is unanswered, help us to find answer for this one

The _____ is not a component of the typical dss.

Answer

Correct Answer: Inference engine

Note: This Question is unanswered, help us to find answer for this one

The _____ standard can transmit up to 75 mbps and has a range of 31 miles.

Answer

Correct Answer: WiMAX

Note: This Question is unanswered, help us to find answer for this one

A planned series of actions in a corporation is a(n) ________.

Answer

Correct Answer: Process

Note: This Question is unanswered, help us to find answer for this one

_____ refers to efforts by unauthorized users to access data traveling over wireless networks.

Answer

Correct Answer: Eavesdropping

Note: This Question is unanswered, help us to find answer for this one

_____ connect buyers and sellers across many industries and are used mainly for indirect materials.

Answer

Correct Answer: Horizontal exchanges

Note: This Question is unanswered, help us to find answer for this one

____ is text that has no formatting (such as bolding or underlining) applied.

Answer

Correct Answer: Plain text

Note: This Question is unanswered, help us to find answer for this one

With respect to the general classes of computers, a ________ is used for small business computing.

Answer

Correct Answer: Personal computer

Note: This Question is unanswered, help us to find answer for this one

_________ tags make it possible to search for photos or videos using keywords.

Answer

Correct Answer: Metadata

Note: This Question is unanswered, help us to find answer for this one

The ________characteristic of high-quality information ensures that all the values are correct.

Answer

Correct Answer: Accuracy

Note: This Question is unanswered, help us to find answer for this one

_____ feasibility is concerned with whether a new system can be completed on time.

Answer

Correct Answer: Economic

Note: This Question is unanswered, help us to find answer for this one

The goal of the planning phase for an information system project is to create a(n) ____________.

Answer

Correct Answer: Project development plan

Note: This Question is unanswered, help us to find answer for this one

During the implementation phase of the systems development life cycle (sdlc), _____.

Answer

Correct Answer: Phased-in-phased-out

Note: This Question is unanswered, help us to find answer for this one

A __________ is a system that protects the computer network from unauthorized access.

Answer

Correct Answer: Firewall.

Note: This Question is unanswered, help us to find answer for this one

A key feature on an enterprise resource planning system is that _____.

Answer

Correct Answer: It employs a database of key operational and planning data that can be shared by all

Note: This Question is unanswered, help us to find answer for this one

A key feature of an enterprise system is that _________.

Answer

Correct Answer: It employs a database of key operational and planning data that can be shared by all

Note: This Question is unanswered, help us to find answer for this one

The temperature of ignition is called the _________________________ of a material.

Answer

Correct Answer: Flame

Note: This Question is unanswered, help us to find answer for this one

If you determine a virus has struck a system, the first step is to _________.

Answer

Correct Answer: Unplug the machines from the network

Note: This Question is unanswered, help us to find answer for this one

Besides its regular display, almost every font has ____ common stylistic sets.

Answer

Correct Answer: Three

Note: This Question is unanswered, help us to find answer for this one

A user name ________ a user.

Answer

Correct Answer: Identifies.

Note: This Question is unanswered, help us to find answer for this one

In a(n) ________ system, each step is dependent on the previous step being completed.

Answer

Correct Answer: Waterfall

Note: This Question is unanswered, help us to find answer for this one

The best password will use ________.

Answer

Correct Answer: Upper- and lowercase letters of the alphabet with no words in any​ language, some special characters and some​ numbers, and will be at least 10 characters long

Note: This Question is unanswered, help us to find answer for this one

________ often get their authentication information from ________.

Answer

Correct Answer: Central authentication servers, metadirectory servers

Note: This Question is unanswered, help us to find answer for this one

Most encryption for data stored on a laptop uses ____ cryptography.

Answer

Correct Answer: Private key

Note: This Question is unanswered, help us to find answer for this one

In an if...then statement, the ____ symbol is used to test for inequality.

Answer

Correct Answer: ​<>

Note: This Question is unanswered, help us to find answer for this one

The most basic type of cryptographic algorithm is a ____ algorithm.

Answer

Correct Answer: Hash

Note: This Question is unanswered, help us to find answer for this one

Public key infrastructure (pki) _____.

Answer

Correct Answer: Is the management of digital certificates

Note: This Question is unanswered, help us to find answer for this one

An entity that issues digital certificates is a _____.

Answer

Correct Answer: Certificate Authority (CA)

Note: This Question is unanswered, help us to find answer for this one

If the expression is false, the ________ operator will return true.

Answer

Correct Answer: NOT

Note: This Question is unanswered, help us to find answer for this one

The protocols pop3 and __________ can be used to manage your incoming mail.

Answer

Correct Answer: IMAP (Internet Message Access Protocol)

Note: This Question is unanswered, help us to find answer for this one

The ideal solution to the threat of malware is __________.

Answer

Correct Answer: Prevention

Note: This Question is unanswered, help us to find answer for this one

The most basic level of data security in windows 7 is ____ permissions.

Answer

Correct Answer: NTFS

Note: This Question is unanswered, help us to find answer for this one

Parking meters that you can pay via your mobile telephone are an example of _________.

Answer

Correct Answer: Wireless electronic payment

Note: This Question is unanswered, help us to find answer for this one

If the time series in an exponential smoothing model exhibits a negative trend, the _____.

Answer

Correct Answer: Forecast will overshoot the actual values

Note: This Question is unanswered, help us to find answer for this one

Social capital, unlike traditional capital, ________.

Answer

Correct Answer: Sometimes depreciates and at other times appreciates with time

Note: This Question is unanswered, help us to find answer for this one

You use ________ to predict when a computer hardware system becomes saturated.

Answer

Correct Answer: Capacity planning

Note: This Question is unanswered, help us to find answer for this one

When using a(n) ____ join, only rows that meet the given criteria are returned.

Answer

Correct Answer: Set

Note: This Question is unanswered, help us to find answer for this one

The characteristics of online processing systems are that _____.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

An sla for latency should specify a ________.

Answer

Correct Answer: Maximum latency.

Note: This Question is unanswered, help us to find answer for this one

As an is user, you have a right to a secure computing environment. this means that ________.

Answer

Correct Answer: The organization should protect your computer and its files

Note: This Question is unanswered, help us to find answer for this one

Wpa replaces wep with _____.

Answer

Correct Answer: Temporal Key Integrity Protocol (TKIP)

Note: This Question is unanswered, help us to find answer for this one

Traditional data formats change ______ while big data formats change _______.

Answer

Correct Answer: Slowly, rapidly

Note: This Question is unanswered, help us to find answer for this one

The office ____ is a temporary storage area.

Answer

Correct Answer: Clipboard

Note: This Question is unanswered, help us to find answer for this one

The audience for pseudocode is the _____.

Answer

Correct Answer: Programmer

Note: This Question is unanswered, help us to find answer for this one

____ refers to identifying the browser used by each visitor, typically via javascript code.

Answer

Correct Answer: Browser sniffing

Note: This Question is unanswered, help us to find answer for this one

In the five-component model, the process of automation is a process of moving work from ________.

Answer

Correct Answer: The digital mode to the analog mode

Note: This Question is unanswered, help us to find answer for this one

During modeling of the crisp-dm method, we would ______.

Answer

Correct Answer: Apply selected modeling techniques

Note: This Question is unanswered, help us to find answer for this one

Digital signatures are used for ________ authentication.

Answer

Correct Answer: Message authentication

Note: This Question is unanswered, help us to find answer for this one

In asymmetric encryption, each site has a ________ for encoding messages.

Answer

Correct Answer: Public key

Note: This Question is unanswered, help us to find answer for this one

A(n) _____ is not decrypted but is only used for comparison purposes.

Answer

Correct Answer: Digest

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is the computer program that converts plaintext into an enciphered form.

Answer

Correct Answer: Encryption algorithm

Note: This Question is unanswered, help us to find answer for this one

The term _____ best describes the level of technology skills needed in today’s business world.

Answer

Correct Answer: Computer fluency

Note: This Question is unanswered, help us to find answer for this one

The ________ component of the is framework provides instructions for people.

Answer

Correct Answer: Procedure

Note: This Question is unanswered, help us to find answer for this one

The best and most effective way to manage authentication is through ___________.

Answer

Correct Answer: Biometrics

Note: This Question is unanswered, help us to find answer for this one

The application gateway is also known as a(n) ____

Answer

Correct Answer: Application-level firewall

Note: This Question is unanswered, help us to find answer for this one

Whereas phishing attacks are ________, denial of service attacks are ________.

Answer

Correct Answer: Remote attacks requiring user action; remote attacks requiring no user action

Note: This Question is unanswered, help us to find answer for this one

The two types of malware that have the primary objective of infecting a computer system are ____.

Answer

Correct Answer: Viruses and worms

Note: This Question is unanswered, help us to find answer for this one

The _________ lock can make it difficult for thieves to steal a laptop.

Answer

Correct Answer: Kensigton

Note: This Question is unanswered, help us to find answer for this one

With respect to computer networks, ________ are also referred to as wi-fi networks.

Answer

Correct Answer: Wireless local area networks

Note: This Question is unanswered, help us to find answer for this one

Trait theorists are generally more interested in __________ rather than __________.

Answer

Correct Answer: Explaining why behavior occurs . . . predicting behavioral patterns

Note: This Question is unanswered, help us to find answer for this one

To organize large amounts of information, it is best to use ____.

Answer

Correct Answer: Tables

Note: This Question is unanswered, help us to find answer for this one

To display the contents of a file called data, use the command ____.

Answer

Correct Answer: Cat data

Note: This Question is unanswered, help us to find answer for this one

To describe a queuing system, we use the term ____ for the object that provides the service.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

To delete rows from the database, use the ____ command.

Answer

Correct Answer: DELETE

Note: This Question is unanswered, help us to find answer for this one

To define styles under landscape orientation, use the @media rule, setting the orientation to ____.

Answer

Correct Answer: Landscape

Note: This Question is unanswered, help us to find answer for this one

To avoid the look of missing data in a report, use the hide duplicates property on ____ fields.

Answer

Correct Answer: Sorted

Note: This Question is unanswered, help us to find answer for this one

When loops are nested, _____.

Answer

Correct Answer: Inner

Note: This Question is unanswered, help us to find answer for this one

The field in a table that is used to relate that table to other tables is called the ____.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

The practice of using similar but not identical domain names is called _____.

Answer

Correct Answer: Domain tasting

Note: This Question is unanswered, help us to find answer for this one

To connect multiple businesses from different locations, a ____ area network setup could be used.

Answer

Correct Answer: Wide

Note: This Question is unanswered, help us to find answer for this one

Security systems ultimately depend on the behavior of their ________.

Answer

Correct Answer: Users

Note: This Question is unanswered, help us to find answer for this one

Scsi is a ____ interface and not just an interface technique for hard disk drives.

Answer

Correct Answer: Systems

Note: This Question is unanswered, help us to find answer for this one

Many corporations use a ____ to help secure the confidentiality and integrity of information.

Answer

Correct Answer: Data Classification Scheme

Note: This Question is unanswered, help us to find answer for this one

In the context of web and network privacy, an acceptable use policy is _____.

Answer

Correct Answer: Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

Note: This Question is unanswered, help us to find answer for this one

In terms of password management, when an account is created, users should ________.

Answer

Correct Answer: Immediately change the password they are given to a password of their own

Note: This Question is unanswered, help us to find answer for this one

In order to protect your password, you should never ________.

Answer

Correct Answer: Use the password more than three times in a day

Note: This Question is unanswered, help us to find answer for this one

In information systems, saas stands for ________.

Answer

Correct Answer: SOFTWARE AS A SERVICE

Note: This Question is unanswered, help us to find answer for this one

In data encryption, the https indicates a safe http connection over _____.

Answer

Correct Answer: Secure Sockets Layer

Note: This Question is unanswered, help us to find answer for this one

In comparison with unstructured information, semi-structured information ________.

Answer

Correct Answer: Is easier to query and aggregate

Note: This Question is unanswered, help us to find answer for this one

An example of a wi-fi security standard is ____.

Answer

Correct Answer: WPA

Note: This Question is unanswered, help us to find answer for this one

A security awareness program includes ________

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

A secure system includes _____ that can log every instance of data entry and changes.

Answer

Correct Answer: Audit trails

Note: This Question is unanswered, help us to find answer for this one

A merge operation in word generally requires _____ files(s).

Answer

Correct Answer: Two

Note: This Question is unanswered, help us to find answer for this one

Global positioning system (gps) consists of ____ and a group of gps satellites.

Answer

Correct Answer: GPS receivers

Note: This Question is unanswered, help us to find answer for this one

A genetic algorithm is an approach to solving problems based on the _____.

Answer

Correct Answer: Theory of evolution

Note: This Question is unanswered, help us to find answer for this one

A field or a group of fields that make a record unique in a table is called a(n) ________.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

A computer is the ____ of an attack when it is used to conduct the attack.

Answer

Correct Answer: Subject

Note: This Question is unanswered, help us to find answer for this one

A computer hacker usually gets into a company’s network by _____.

Answer

Correct Answer: Finding a single unlocked door in a virtual hallway

Note: This Question is unanswered, help us to find answer for this one

A ________________ is a software tool for specifying the content and format for a database report.

Answer

Correct Answer: Report generator

Note: This Question is unanswered, help us to find answer for this one

A _____ is a simple database program whose records have no relationship to one another.

Answer

Correct Answer: Flat file

Note: This Question is unanswered, help us to find answer for this one

A ____ is usually the best approach to security project implementation.

Answer

Correct Answer: Phased implementation

Note: This Question is unanswered, help us to find answer for this one

A ____ is a shared electrical or optical channel that connects two or more devices.

Answer

Correct Answer: Bus

Note: This Question is unanswered, help us to find answer for this one

A ____ is a cryptographic means of authentication.

Answer

Correct Answer: Digital signature

Note: This Question is unanswered, help us to find answer for this one

___________________ is the act of protecting information and the systems that store and process it.

Answer

Correct Answer: Information systems security

Note: This Question is unanswered, help us to find answer for this one

________refers to a precise set of instructions that tell the computer hardware what to do.

Answer

Correct Answer: Software

Note: This Question is unanswered, help us to find answer for this one

_____ provide the standards, syntax, statements, and instructions for writing computer software.

Answer

Correct Answer: Programming languages

Note: This Question is unanswered, help us to find answer for this one

_____ prevents new adware from being installed on your computer.

Answer

Correct Answer: Antispyware

Note: This Question is unanswered, help us to find answer for this one

_____ networks use multiple wi-fi access points to create a wide area network.

Answer

Correct Answer: Mesh networks

Note: This Question is unanswered, help us to find answer for this one

____ supports network neutrality

Answer

Correct Answer: Google

Note: This Question is unanswered, help us to find answer for this one

____ can be used to determine whether new ip addresses are attempting to probe the network.

Answer

Correct Answer: Firewall logs

Note: This Question is unanswered, help us to find answer for this one

___ of breaches are caused by stealing a password

Answer

Correct Answer: A very high percentage (around 80%)

Note: This Question is unanswered, help us to find answer for this one