MCQs > IT & Programming > Computer Science MCQs > Information System and Security MCQs

Information System and Security MCQ

Information System and Security

1. A digital certificate associates _____.

Answer

Correct Answer: The user's identity with his public key

Note: This Question is unanswered, help us to find answer for this one

2. _______________ enables you to prevent a party from denying a previous statement or action.

Answer

Correct Answer: Nonrepudiation

Note: This Question is unanswered, help us to find answer for this one

3. Transmitted data stored locally are referred to as __________ .

Answer

Correct Answer: Data at rest

Note: This Question is unanswered, help us to find answer for this one

4. The successor to 3des is the ____________________ encryption standard.

Answer

Correct Answer: Advanced

Note: This Question is unanswered, help us to find answer for this one

5. The number of possible keys to a cipher is a ___________.

Answer

Correct Answer: Keyspace.

Note: This Question is unanswered, help us to find answer for this one

6. The __________ approach is vulnerable to man-in-the-middle attacks.

Answer

Correct Answer: Anonymous Diffie-Hellman

Note: This Question is unanswered, help us to find answer for this one

7. On wireless networks, ____ attacks are commonly done by attackers setting up an evil twin.

Answer

Correct Answer: Man-in-the-middle

Note: This Question is unanswered, help us to find answer for this one

8. Its essential to match your organizations required __________ with its security structure.

Answer

Correct Answer: Permission level

Note: This Question is unanswered, help us to find answer for this one

9. Collecting in-depth information about an individual is known as ____.

Answer

Correct Answer: Electronic profiling

Note: This Question is unanswered, help us to find answer for this one

10. Each of these is a reason why adware is scorned except _____.

Answer

Correct Answer: It displays the attackers programming skills

Note: This Question is unanswered, help us to find answer for this one

11. Each of the following can be classified as an "insider" except _______.

Answer

Correct Answer: Cybercriminals

Note: This Question is unanswered, help us to find answer for this one

12. Digital signatures should be created using processes and products that are based on the __________.

Answer

Correct Answer: DSS

Note: This Question is unanswered, help us to find answer for this one

13. A centralized directory of digital certificates is called a(n) _____.

Answer

Correct Answer: Certificate Repository (CR)

Note: This Question is unanswered, help us to find answer for this one

14. A ____ virus mutates with every infection, thus making them difficult to locate.

Answer

Correct Answer: Polymorphic

Note: This Question is unanswered, help us to find answer for this one

15. ____________________ may be defined as confidence in or reliance on another person or entity.

Answer

Correct Answer: Trust

Note: This Question is unanswered, help us to find answer for this one

16. _________ ensures that any changes to a production system are tested, documented, and approved.

Answer

Correct Answer: Change control

Note: This Question is unanswered, help us to find answer for this one

17. Clerical workers using computers for word-processing tasks is an example of job _____.

Answer

Correct Answer: Up grading

Note: This Question is unanswered, help us to find answer for this one

18. For longer video clips, the time in the cue is written in the form _____.

Answer

Correct Answer: Hh:mm:ss.ms

Note: This Question is unanswered, help us to find answer for this one

19. The sscp exam consists of ____ multiple-choice questions, and must be completed within three hours.

Answer

Correct Answer: 125

Note: This Question is unanswered, help us to find answer for this one

20. Symmetric algorithms are typically known for their ability to maintain _______________.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

21. For computer access, a false ________ means that a legitimate user is denied access to a resource.

Answer

Correct Answer: Rejection

Note: This Question is unanswered, help us to find answer for this one

22. Developing a seamless integration of databases with the internet is something called a(n) ______.

Answer

Correct Answer: Semantic web

Note: This Question is unanswered, help us to find answer for this one

23. Government agencies have not supported cloud computing due to the lack of ____.

Answer

Correct Answer: Privacy and security

Note: This Question is unanswered, help us to find answer for this one

24. Commerce service providers are also called _____ service providers.

Answer

Correct Answer: Managed

Note: This Question is unanswered, help us to find answer for this one

25. According to the disruptive growth engine, executive leadership will allow a firm to ________.

Answer

Correct Answer: Gain credibility and to bridge sustaining and disruptive product development

Note: This Question is unanswered, help us to find answer for this one

26. A systems request form should not ____.

Answer

Correct Answer: Have complex instructions

Note: This Question is unanswered, help us to find answer for this one

27. A social bookmarking site is dedicated to providing all of the following except ________.

Answer

Correct Answer: To reconnect with colleagues for business progress

Note: This Question is unanswered, help us to find answer for this one

28. A project triangle shows three legs: _____.

Answer

Correct Answer: Project cost, scope, and time

Note: This Question is unanswered, help us to find answer for this one

29. A professional who specializes in analyzing and designing business systems is called a(n) ____.

Answer

Correct Answer: Systems analyst

Note: This Question is unanswered, help us to find answer for this one

30. A popular technique for investigating causes and effects is called a _____ diagram.

Answer

Correct Answer: Fishbone

Note: This Question is unanswered, help us to find answer for this one

31. A major challenge in the successful implementation of an erp system is _____.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

32. ________ conversion is the riskiest type of conversion process.

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

33. ______ compares data with a set of rules or values to determine if the data meets certain criteria.

Answer

Correct Answer: Validation

Note: This Question is unanswered, help us to find answer for this one

34. The hashed message authentication code (hmac) _____.

Answer

Correct Answer: Encrypts the key and the message

Note: This Question is unanswered, help us to find answer for this one

35. Radius and tacacs belong to a category of protocols known as aaa (____).

Answer

Correct Answer: Authentication, authorization, and accounting

Note: This Question is unanswered, help us to find answer for this one

36. The most reliable nmap scan is ____________ scan.

Answer

Correct Answer: Connect

Note: This Question is unanswered, help us to find answer for this one

37. Digital certificates can be used for each of these except _____.

Answer

Correct Answer: To verify the authenticity of the Registration Authorizer

Note: This Question is unanswered, help us to find answer for this one

38. In ipsec ____________________ mode, only the ip data is encrypted, not the ip headers.

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

39. In a ____ attack, a person redirects or captures secure transmissions as they occur.

Answer

Correct Answer: Man in the middle

Note: This Question is unanswered, help us to find answer for this one

40. In ____, a hacker forges name server records to falsify his hosts identity.

Answer

Correct Answer: DNS Spoofing

Note: This Question is unanswered, help us to find answer for this one

41. Aes implements a block cipher called the rijndael block cipher. _________________________

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

42. __________ was developed by phil zimmermann and uses the idea cipher for message encoding.

Answer

Correct Answer: Pretty Good Privacy (PGP)

Note: This Question is unanswered, help us to find answer for this one

43. __________ are encrypted messages that can be mathematically proven to be authentic.

Answer

Correct Answer: Digital signature

Note: This Question is unanswered, help us to find answer for this one

44. ____ is a method of encrypting tcp/ip transmissions above the network layer.

Answer

Correct Answer: SSL

Note: This Question is unanswered, help us to find answer for this one

45. Ultraportables conforming to intels standards can be marketed as ____.

Answer

Correct Answer: Ultrabooks

Note: This Question is unanswered, help us to find answer for this one

46. An executive information system (eis) is a branch of ____.

Answer

Correct Answer: DSS

Note: This Question is unanswered, help us to find answer for this one

47. __________ is the first function in the propagation phase for a network worm.

Answer

Correct Answer: Fingerprinting

Note: This Question is unanswered, help us to find answer for this one

48. The umls ___________ contains the terminology, classification and code system standards.

Answer

Correct Answer: Metathesaurus

Note: This Question is unanswered, help us to find answer for this one

49. The primary disadvantage of centralized database systems is ________.

Answer

Correct Answer: Transmission delay when users are geo-dispersed

Note: This Question is unanswered, help us to find answer for this one

50. The information about invoices to customers is tracked by ____ system.

Answer

Correct Answer: Transaction processing system

Note: This Question is unanswered, help us to find answer for this one

51. The ________ houses the power supply, memory, and drive bays of the computer.

Answer

Correct Answer: System unit

Note: This Question is unanswered, help us to find answer for this one

52. The firewall device must never be accessible directly from the ____________________ network.

Answer

Correct Answer: Public

Note: This Question is unanswered, help us to find answer for this one

53. The architecture of a(n) ____________________ firewall provides a dmz.

Answer

Correct Answer: Screened Subnet

Note: This Question is unanswered, help us to find answer for this one

54. In an information systems department, the enterprise systems subunit is responsible for ________.

Answer

Correct Answer: Developing, installing, maintaining, and overseeing the organization's mission-critical software applications

Note: This Question is unanswered, help us to find answer for this one

55. Hybrid notebook-tablet computers are also called convertible tablets or ____.

Answer

Correct Answer: 2-in-1 computers

Note: This Question is unanswered, help us to find answer for this one

56. ____ is a valuable resource for additional information on building and staffing csirts.

Answer

Correct Answer: NIST

Note: This Question is unanswered, help us to find answer for this one

57. A(n) ____ is like a locked door on your computer.

Answer

Correct Answer: Firewall

Note: This Question is unanswered, help us to find answer for this one

58. The us-cert incident reporting system is used to ____.

Answer

Correct Answer: ​alert the Department of Homeland Security about information security incidents

Note: This Question is unanswered, help us to find answer for this one

59. Hardware-based security controls include ____.

Answer

Correct Answer: None of the above.

Note: This Question is unanswered, help us to find answer for this one

60. Activity trackers and smartwatches are two types of ______ devices.

Answer

Correct Answer: Wearable

Note: This Question is unanswered, help us to find answer for this one

61. Each of the following is true regarding a keylogger except _______.

Answer

Correct Answer: Hardware keyloggers are installed between the keyboard connector and computer keyboard or USB port

Note: This Question is unanswered, help us to find answer for this one

62. The threats to information security are _____, and the greatest threat is _____.

Answer

Correct Answer: Increasing; human

Note: This Question is unanswered, help us to find answer for this one

63. One of the first vendor-specific certification programs was offered by ____.

Answer

Correct Answer: Novell

Note: This Question is unanswered, help us to find answer for this one

64. In dblc, the phase after the database initial study is _____.

Answer

Correct Answer: Database design

Note: This Question is unanswered, help us to find answer for this one

65. Data in a multidimensional database is organized in a ________ format

Answer

Correct Answer: Cube

Note: This Question is unanswered, help us to find answer for this one

66. Behavioral models of management see managers as being ________ than does the classical model.

Answer

Correct Answer: More informal

Note: This Question is unanswered, help us to find answer for this one

67. A(n) ________ check determines whether a required field such as lastname was filled in.

Answer

Correct Answer: Completeness

Note: This Question is unanswered, help us to find answer for this one

68. A tool used by installers to remove the case from a desktop pc is a ____.

Answer

Correct Answer: Nut driver.

Note: This Question is unanswered, help us to find answer for this one

69. Transaction data for a crm system might be gathered using ____.

Answer

Correct Answer: Grocery store loyalty cards

Note: This Question is unanswered, help us to find answer for this one

70. In a data flow diagram (dfd), a spontaneous generation process is a process that has _____.

Answer

Correct Answer: ​no input

Note: This Question is unanswered, help us to find answer for this one

71. A(n) _____ is a group of similar objects.

Answer

Correct Answer: Class

Note: This Question is unanswered, help us to find answer for this one

72. When ppp is used over an ethernet network, it is known as ________________.

Answer

Correct Answer: Point to Point over Ethernet

Note: This Question is unanswered, help us to find answer for this one

73. A ________ is an encryption key used to encrypt other keys before transmitting them.

Answer

Correct Answer: Key-encrypting key

Note: This Question is unanswered, help us to find answer for this one

74. A(n) ____ attack is a hacker using a personal computer to break into a system.

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

75. The cto heads the ________ group in the is department.

Answer

Correct Answer: Technology.

Note: This Question is unanswered, help us to find answer for this one

76. Unlike an executive information system, a decision support system (dss) ____.

Answer

Correct Answer: Helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models

Note: This Question is unanswered, help us to find answer for this one

77. The microsoft office suite is a tempting target for viruses because ___________.

Answer

Correct Answer: It is designed so that programmers can access its internal objects

Note: This Question is unanswered, help us to find answer for this one

78. Is the result of optimizing operations and supplier processes.

Answer

Correct Answer: Cost Reduction

Note: This Question is unanswered, help us to find answer for this one

79. A(n) ________ is a dedicated computer in a client/server environment that hosts a dbms.

Answer

Correct Answer: Database server

Note: This Question is unanswered, help us to find answer for this one

80. A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.

Answer

Correct Answer: Business ecosystem

Note: This Question is unanswered, help us to find answer for this one

81. ________ is the security guarantee that people who intercept messages cannot read them.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

82. Qr or ________ codes let any piece of print host a link to online information

Answer

Correct Answer: Quick response

Note: This Question is unanswered, help us to find answer for this one

83. Online analytical processing is the foundation of the ________ module in erp.

Answer

Correct Answer: Business intelligence

Note: This Question is unanswered, help us to find answer for this one

84. In fisma, ________ is done internally by the organization.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

85. The ____ view involves how data is stored on and retrieved from storage media.

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

86. ________ is our normal sense of the world around us enhanced with digital information.

Answer

Correct Answer: Augmented reality

Note: This Question is unanswered, help us to find answer for this one

87. ____ is the formal term for combining two or more columns to form a primary key.

Answer

Correct Answer: Concatenation

Note: This Question is unanswered, help us to find answer for this one

88. A(n) ____ is an extension of an organization?s intranet into cloud computing.

Answer

Correct Answer: Private cloud.

Note: This Question is unanswered, help us to find answer for this one

89. A subform may be added to a main form by using the subform/subreport tool or by using the ____.

Answer

Correct Answer: Subform Wizard

Note: This Question is unanswered, help us to find answer for this one

90. A high-end graphics card is sometimes called a ____ card.

Answer

Correct Answer: Video

Note: This Question is unanswered, help us to find answer for this one

91. In mpls, the ________ adds the label to the packet.

Answer

Correct Answer: First label-switching router

Note: This Question is unanswered, help us to find answer for this one

92. Supply chain execution ________.

Answer

Correct Answer: Involves the management of information flow

Note: This Question is unanswered, help us to find answer for this one

93. E-hubs are more ________ than private industrial networks.

Answer

Correct Answer: Transaction-oriented

Note: This Question is unanswered, help us to find answer for this one

94. In biometric, a match occurs when a ________ meets the decision criteria.

Answer

Correct Answer: Match index

Note: This Question is unanswered, help us to find answer for this one

95. Sophisticated attacks often are difficult to identify amid the ""noise"" of many ________ attacks.

Answer

Correct Answer: Script kiddie

Note: This Question is unanswered, help us to find answer for this one

96. Smartphones use ________ technology, allowing users to perform several functions with one device.

Answer

Correct Answer: Convergence or integration

Note: This Question is unanswered, help us to find answer for this one

97. Porter defined value as the ________.

Answer

Correct Answer: Amount of money that a customer is willing to pay for an offering

Note: This Question is unanswered, help us to find answer for this one

98. Benchmark tests on competing products can be used to select ____.

Answer

Correct Answer: Both hardware and software products

Note: This Question is unanswered, help us to find answer for this one

99. During the early 1980s, ____ word processors competed for market share.

Answer

Correct Answer: Several

Note: This Question is unanswered, help us to find answer for this one

100. During the 1980s, incompatible computer products resulted in ____.

Answer

Correct Answer: Excessive spare parts inventories, a lack of transferable employee skills, increased support costs.

Note: This Question is unanswered, help us to find answer for this one

101. _________ is the most difficult, radical, lengthy, and comprehensive strategy.

Answer

Correct Answer: BPR

Note: This Question is unanswered, help us to find answer for this one

102. To request a web page or other resource located on the internet, use its ____.

Answer

Correct Answer: Both

Note: This Question is unanswered, help us to find answer for this one

103. Products and services designed to target a specific industry are known as _____.

Answer

Correct Answer: None of these

Note: This Question is unanswered, help us to find answer for this one

104. A comparison is correct only when the correct ____ and operator are used.

Answer

Correct Answer: Operands

Note: This Question is unanswered, help us to find answer for this one

105. Ipv6 was introduced when ipv4 ________.

Answer

Correct Answer: No longer had enough unique addresses

Note: This Question is unanswered, help us to find answer for this one

106. The use of certificate authorities to associate public keys with certain users is known as ____.

Answer

Correct Answer: PKI

Note: This Question is unanswered, help us to find answer for this one

107. The need for collaboration is greatest for ________ decisions.

Answer

Correct Answer: Strategic

Note: This Question is unanswered, help us to find answer for this one

108. One characteristic of a structured problem is that _____.

Answer

Correct Answer: It is straightforward, requiring known facts and relationships

Note: This Question is unanswered, help us to find answer for this one

109. In the context of the data component of an information system, external data sources include _____.

Answer

Correct Answer: Labor statistics

Note: This Question is unanswered, help us to find answer for this one

110. Amazon.com uses ____ to provide customized book recommendations based on past purchases.

Answer

Correct Answer: Cookies

Note: This Question is unanswered, help us to find answer for this one

111. A computer ____ is a person who has been hired to break into a computer and steal information.

Answer

Correct Answer: Spy

Note: This Question is unanswered, help us to find answer for this one

112. In a cost-benefit analysis, operating costs are ____ costs.

Answer

Correct Answer: Ongoing

Note: This Question is unanswered, help us to find answer for this one

113. The _____ is not a component of the typical dss.

Answer

Correct Answer: Inference engine

Note: This Question is unanswered, help us to find answer for this one

114. The _____ standard can transmit up to 75 mbps and has a range of 31 miles.

Answer

Correct Answer: WiMAX

Note: This Question is unanswered, help us to find answer for this one

115. A planned series of actions in a corporation is a(n) ________.

Answer

Correct Answer: Process

Note: This Question is unanswered, help us to find answer for this one

116. _____ refers to efforts by unauthorized users to access data traveling over wireless networks.

Answer

Correct Answer: Eavesdropping

Note: This Question is unanswered, help us to find answer for this one

117. _____ connect buyers and sellers across many industries and are used mainly for indirect materials.

Answer

Correct Answer: Horizontal exchanges

Note: This Question is unanswered, help us to find answer for this one

118. ____ is text that has no formatting (such as bolding or underlining) applied.

Answer

Correct Answer: Plain text

Note: This Question is unanswered, help us to find answer for this one

119. With respect to the general classes of computers, a ________ is used for small business computing.

Answer

Correct Answer: Personal computer

Note: This Question is unanswered, help us to find answer for this one

120. _________ tags make it possible to search for photos or videos using keywords.

Answer

Correct Answer: Metadata

Note: This Question is unanswered, help us to find answer for this one

121. The ________characteristic of high-quality information ensures that all the values are correct.

Answer

Correct Answer: Accuracy

Note: This Question is unanswered, help us to find answer for this one

122. _____ feasibility is concerned with whether a new system can be completed on time.

Answer

Correct Answer: Economic

Note: This Question is unanswered, help us to find answer for this one

123. The goal of the planning phase for an information system project is to create a(n) ____________.

Answer

Correct Answer: Project development plan

Note: This Question is unanswered, help us to find answer for this one

124. During the implementation phase of the systems development life cycle (sdlc), _____.

Answer

Correct Answer: Phased-in-phased-out

Note: This Question is unanswered, help us to find answer for this one

125. A __________ is a system that protects the computer network from unauthorized access.

Answer

Correct Answer: Firewall.

Note: This Question is unanswered, help us to find answer for this one

126. A key feature on an enterprise resource planning system is that _____.

Answer

Correct Answer: It employs a database of key operational and planning data that can be shared by all

Note: This Question is unanswered, help us to find answer for this one

127. A key feature of an enterprise system is that _________.

Answer

Correct Answer: It employs a database of key operational and planning data that can be shared by all

Note: This Question is unanswered, help us to find answer for this one

128. The temperature of ignition is called the _________________________ of a material.

Answer

Correct Answer: Flame

Note: This Question is unanswered, help us to find answer for this one

129. If you determine a virus has struck a system, the first step is to _________.

Answer

Correct Answer: Unplug the machines from the network

Note: This Question is unanswered, help us to find answer for this one

130. Besides its regular display, almost every font has ____ common stylistic sets.

Answer

Correct Answer: Three

Note: This Question is unanswered, help us to find answer for this one

131. A user name ________ a user.

Answer

Correct Answer: Identifies.

Note: This Question is unanswered, help us to find answer for this one

132. In a(n) ________ system, each step is dependent on the previous step being completed.

Answer

Correct Answer: Waterfall

Note: This Question is unanswered, help us to find answer for this one

133. The best password will use ________.

Answer

Correct Answer: Upper- and lowercase letters of the alphabet with no words in any​ language, some special characters and some​ numbers, and will be at least 10 characters long

Note: This Question is unanswered, help us to find answer for this one

134. ________ often get their authentication information from ________.

Answer

Correct Answer: Central authentication servers, metadirectory servers

Note: This Question is unanswered, help us to find answer for this one

135. Most encryption for data stored on a laptop uses ____ cryptography.

Answer

Correct Answer: Private key

Note: This Question is unanswered, help us to find answer for this one

136. In an if...then statement, the ____ symbol is used to test for inequality.

Answer

Correct Answer: ​<>

Note: This Question is unanswered, help us to find answer for this one

137. The most basic type of cryptographic algorithm is a ____ algorithm.

Answer

Correct Answer: Hash

Note: This Question is unanswered, help us to find answer for this one

138. Public key infrastructure (pki) _____.

Answer

Correct Answer: Is the management of digital certificates

Note: This Question is unanswered, help us to find answer for this one

139. An entity that issues digital certificates is a _____.

Answer

Correct Answer: Certificate Authority (CA)

Note: This Question is unanswered, help us to find answer for this one

140. If the expression is false, the ________ operator will return true.

Answer

Correct Answer: NOT

Note: This Question is unanswered, help us to find answer for this one

141. The protocols pop3 and __________ can be used to manage your incoming mail.

Answer

Correct Answer: IMAP (Internet Message Access Protocol)

Note: This Question is unanswered, help us to find answer for this one

142. The ideal solution to the threat of malware is __________.

Answer

Correct Answer: Prevention

Note: This Question is unanswered, help us to find answer for this one

143. The most basic level of data security in windows 7 is ____ permissions.

Answer

Correct Answer: NTFS

Note: This Question is unanswered, help us to find answer for this one

144. Parking meters that you can pay via your mobile telephone are an example of _________.

Answer

Correct Answer: Wireless electronic payment

Note: This Question is unanswered, help us to find answer for this one

145. If the time series in an exponential smoothing model exhibits a negative trend, the _____.

Answer

Correct Answer: Forecast will overshoot the actual values

Note: This Question is unanswered, help us to find answer for this one

146. Social capital, unlike traditional capital, ________.

Answer

Correct Answer: Sometimes depreciates and at other times appreciates with time

Note: This Question is unanswered, help us to find answer for this one

147. You use ________ to predict when a computer hardware system becomes saturated.

Answer

Correct Answer: Capacity planning

Note: This Question is unanswered, help us to find answer for this one

148. When using a(n) ____ join, only rows that meet the given criteria are returned.

Answer

Correct Answer: Set

Note: This Question is unanswered, help us to find answer for this one

149. The characteristics of online processing systems are that _____.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

150. An sla for latency should specify a ________.

Answer

Correct Answer: Maximum latency.

Note: This Question is unanswered, help us to find answer for this one

151. As an is user, you have a right to a secure computing environment. this means that ________.

Answer

Correct Answer: The organization should protect your computer and its files

Note: This Question is unanswered, help us to find answer for this one

152. Wpa replaces wep with _____.

Answer

Correct Answer: Temporal Key Integrity Protocol (TKIP)

Note: This Question is unanswered, help us to find answer for this one

153. Traditional data formats change ______ while big data formats change _______.

Answer

Correct Answer: Slowly, rapidly

Note: This Question is unanswered, help us to find answer for this one

154. The office ____ is a temporary storage area.

Answer

Correct Answer: Clipboard

Note: This Question is unanswered, help us to find answer for this one

155. The audience for pseudocode is the _____.

Answer

Correct Answer: Programmer

Note: This Question is unanswered, help us to find answer for this one

156. ____ refers to identifying the browser used by each visitor, typically via javascript code.

Answer

Correct Answer: Browser sniffing

Note: This Question is unanswered, help us to find answer for this one

157. In the five-component model, the process of automation is a process of moving work from ________.

Answer

Correct Answer: The digital mode to the analog mode

Note: This Question is unanswered, help us to find answer for this one

158. During modeling of the crisp-dm method, we would ______.

Answer

Correct Answer: Apply selected modeling techniques

Note: This Question is unanswered, help us to find answer for this one

159. Digital signatures are used for ________ authentication.

Answer

Correct Answer: Message authentication

Note: This Question is unanswered, help us to find answer for this one

160. In asymmetric encryption, each site has a ________ for encoding messages.

Answer

Correct Answer: Public key

Note: This Question is unanswered, help us to find answer for this one

161. A(n) _____ is not decrypted but is only used for comparison purposes.

Answer

Correct Answer: Digest

Note: This Question is unanswered, help us to find answer for this one

162. A(n) ____ is the computer program that converts plaintext into an enciphered form.

Answer

Correct Answer: Encryption algorithm

Note: This Question is unanswered, help us to find answer for this one

163. The term _____ best describes the level of technology skills needed in today’s business world.

Answer

Correct Answer: Computer fluency

Note: This Question is unanswered, help us to find answer for this one

164. The ________ component of the is framework provides instructions for people.

Answer

Correct Answer: Procedure

Note: This Question is unanswered, help us to find answer for this one

165. The best and most effective way to manage authentication is through ___________.

Answer

Correct Answer: Biometrics

Note: This Question is unanswered, help us to find answer for this one

166. The application gateway is also known as a(n) ____

Answer

Correct Answer: Application-level firewall

Note: This Question is unanswered, help us to find answer for this one

167. Whereas phishing attacks are ________, denial of service attacks are ________.

Answer

Correct Answer: Remote attacks requiring user action; remote attacks requiring no user action

Note: This Question is unanswered, help us to find answer for this one

168. The two types of malware that have the primary objective of infecting a computer system are ____.

Answer

Correct Answer: Viruses and worms

Note: This Question is unanswered, help us to find answer for this one

169. The _________ lock can make it difficult for thieves to steal a laptop.

Answer

Correct Answer: Kensigton

Note: This Question is unanswered, help us to find answer for this one

170. With respect to computer networks, ________ are also referred to as wi-fi networks.

Answer

Correct Answer: Wireless local area networks

Note: This Question is unanswered, help us to find answer for this one

171. Trait theorists are generally more interested in __________ rather than __________.

Answer

Correct Answer: Explaining why behavior occurs . . . predicting behavioral patterns

Note: This Question is unanswered, help us to find answer for this one

172. To organize large amounts of information, it is best to use ____.

Answer

Correct Answer: Tables

Note: This Question is unanswered, help us to find answer for this one

173. To display the contents of a file called data, use the command ____.

Answer

Correct Answer: Cat data

Note: This Question is unanswered, help us to find answer for this one

174. To describe a queuing system, we use the term ____ for the object that provides the service.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

175. To delete rows from the database, use the ____ command.

Answer

Correct Answer: DELETE

Note: This Question is unanswered, help us to find answer for this one

176. To define styles under landscape orientation, use the @media rule, setting the orientation to ____.

Answer

Correct Answer: Landscape

Note: This Question is unanswered, help us to find answer for this one

177. To avoid the look of missing data in a report, use the hide duplicates property on ____ fields.

Answer

Correct Answer: Sorted

Note: This Question is unanswered, help us to find answer for this one

178. When loops are nested, _____.

Answer

Correct Answer: Inner

Note: This Question is unanswered, help us to find answer for this one

179. The field in a table that is used to relate that table to other tables is called the ____.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

180. The practice of using similar but not identical domain names is called _____.

Answer

Correct Answer: Domain tasting

Note: This Question is unanswered, help us to find answer for this one

181. To connect multiple businesses from different locations, a ____ area network setup could be used.

Answer

Correct Answer: Wide

Note: This Question is unanswered, help us to find answer for this one

182. Security systems ultimately depend on the behavior of their ________.

Answer

Correct Answer: Users

Note: This Question is unanswered, help us to find answer for this one

183. Scsi is a ____ interface and not just an interface technique for hard disk drives.

Answer

Correct Answer: Systems

Note: This Question is unanswered, help us to find answer for this one

184. Many corporations use a ____ to help secure the confidentiality and integrity of information.

Answer

Correct Answer: Data Classification Scheme

Note: This Question is unanswered, help us to find answer for this one

185. In the context of web and network privacy, an acceptable use policy is _____.

Answer

Correct Answer: Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

Note: This Question is unanswered, help us to find answer for this one

186. In terms of password management, when an account is created, users should ________.

Answer

Correct Answer: Immediately change the password they are given to a password of their own

Note: This Question is unanswered, help us to find answer for this one

187. In order to protect your password, you should never ________.

Answer

Correct Answer: Use the password more than three times in a day

Note: This Question is unanswered, help us to find answer for this one

188. In information systems, saas stands for ________.

Answer

Correct Answer: SOFTWARE AS A SERVICE

Note: This Question is unanswered, help us to find answer for this one

189. In data encryption, the https indicates a safe http connection over _____.

Answer

Correct Answer: Secure Sockets Layer

Note: This Question is unanswered, help us to find answer for this one

190. In comparison with unstructured information, semi-structured information ________.

Answer

Correct Answer: Is easier to query and aggregate

Note: This Question is unanswered, help us to find answer for this one

191. An example of a wi-fi security standard is ____.

Answer

Correct Answer: WPA

Note: This Question is unanswered, help us to find answer for this one

192. A security awareness program includes ________

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

193. A secure system includes _____ that can log every instance of data entry and changes.

Answer

Correct Answer: Audit trails

Note: This Question is unanswered, help us to find answer for this one

194. A merge operation in word generally requires _____ files(s).

Answer

Correct Answer: Two

Note: This Question is unanswered, help us to find answer for this one

195. Global positioning system (gps) consists of ____ and a group of gps satellites.

Answer

Correct Answer: GPS receivers

Note: This Question is unanswered, help us to find answer for this one

196. A genetic algorithm is an approach to solving problems based on the _____.

Answer

Correct Answer: Theory of evolution

Note: This Question is unanswered, help us to find answer for this one

197. A field or a group of fields that make a record unique in a table is called a(n) ________.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

198. A computer is the ____ of an attack when it is used to conduct the attack.

Answer

Correct Answer: Subject

Note: This Question is unanswered, help us to find answer for this one

199. A computer hacker usually gets into a company’s network by _____.

Answer

Correct Answer: Finding a single unlocked door in a virtual hallway

Note: This Question is unanswered, help us to find answer for this one

200. A ________________ is a software tool for specifying the content and format for a database report.

Answer

Correct Answer: Report generator

Note: This Question is unanswered, help us to find answer for this one

201. A _____ is a simple database program whose records have no relationship to one another.

Answer

Correct Answer: Flat file

Note: This Question is unanswered, help us to find answer for this one

202. A ____ is usually the best approach to security project implementation.

Answer

Correct Answer: Phased implementation

Note: This Question is unanswered, help us to find answer for this one

203. A ____ is a shared electrical or optical channel that connects two or more devices.

Answer

Correct Answer: Bus

Note: This Question is unanswered, help us to find answer for this one

204. A ____ is a cryptographic means of authentication.

Answer

Correct Answer: Digital signature

Note: This Question is unanswered, help us to find answer for this one

205. ___________________ is the act of protecting information and the systems that store and process it.

Answer

Correct Answer: Information systems security

Note: This Question is unanswered, help us to find answer for this one

206. ________refers to a precise set of instructions that tell the computer hardware what to do.

Answer

Correct Answer: Software

Note: This Question is unanswered, help us to find answer for this one

207. _____ provide the standards, syntax, statements, and instructions for writing computer software.

Answer

Correct Answer: Programming languages

Note: This Question is unanswered, help us to find answer for this one

208. _____ prevents new adware from being installed on your computer.

Answer

Correct Answer: Antispyware

Note: This Question is unanswered, help us to find answer for this one

209. _____ networks use multiple wi-fi access points to create a wide area network.

Answer

Correct Answer: Mesh networks

Note: This Question is unanswered, help us to find answer for this one

210. ____ supports network neutrality

Answer

Correct Answer: Google

Note: This Question is unanswered, help us to find answer for this one

211. ____ can be used to determine whether new ip addresses are attempting to probe the network.

Answer

Correct Answer: Firewall logs

Note: This Question is unanswered, help us to find answer for this one

212. ___ of breaches are caused by stealing a password

Answer

Correct Answer: A very high percentage (around 80%)

Note: This Question is unanswered, help us to find answer for this one