Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / University of West FloridaISM 3011 CH

University of West FloridaISM 3011 CH

Business

University of West FloridaISM 3011

CH. 5: REVIEW (e-Business Systems Fundamentals)

1)A_consists of self-propagating program code that is triggered by a specified time or event.

 

  1. In the context of intentional computer and network threats, a                     is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

 

  1. Which statement best describes spyware?

 

  1.                uses a public key known to everyone and a private key known only to the recipient.

 

  1. When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

 

  1.                monitor and record the keys pressed on a keyboard and can be software or hardware devices.

 

  1. The process of capturing and recording network traffic is referred to as                       

 

  1.                can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.

 

  1. Which statement is true of firewalls?

 

  1. In a level 2 security system,                     must be protected to ensure confidentiality, accuracy, and integrity of data.

 

  1. The three important aspects of computer and network security, confidentiality, integrity,

 

and availability, are collectively referred to as the CIA triangle.

 

  1. Similar to phishing,                   is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

 

  1. When planning a comprehensive security system, the first step is designing                          , which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.

 

  1. In the context of intentional security threats,                   can erase data and wreak havoc on computers and networks but do not replicate themselves.

 

  1.                is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.

 

  1. In the event of a network attack or intrusion, a                     lists the tasks that must be performed by the organization to restore damaged data and equipment.

 

  1. Viruses can be transmitted through a network or through e-mail attachments.

 

  1. An intrusion detection system (IDS) can protect networks against both external and internal access.

 

  1.                outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

 

  1. Which security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?

 

  1. Which of the following statements is true of a worm?

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

3.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions