Information Management1.Dashboard2.My courses3.MIS62224.Week 14: Risk Security And Disaster Recovery5.Final ExamQuestion3Not yet answeredMarked out of 1.00Flag questionQuestion textA computer network within a building, or a campus of adjacent buildings, is called a Show
Get answer to your question and much more Question6Not yet answeredMarked out of 1.00 Flag questionQuestion textA _____ is a type of malware that spreads in a network without human intervention.Select one: Get answer to your question and much more Question7Not yet answeredMarked out of 1.00Flag questionQuestion textBecause of _____, a company’s nationality is not always obvious.Select one: Get answer to your question and much more d.their dispersed operationsQuestion8Not yet answeredMarked out of 1.00Flag questionQuestion textWiMAX is a____ technology.The smallest piece of data is called a ___.Select one:Question9Not yet answeredMarked out of 1.00Flag questionQuestion textTrue or False: Business decisions are not affected by geographic locations.Question10Not yet answeredMarked out of 1.00Flag questionQuestion textThe smallest piece of data is called a ___.Select one: Get answer to your question and much more Question11Not yet answeredMarked out of 1.00Flag questionQuestion textOne of the risks of software licensing is the ____.Select one:a.difficulty in modifications to meet specific needsb.lack of after-sales supportc.increased duration for system availability and implementation Question13Not yet answeredMarked out of 1.00Flag questionQuestion textTrue or False: Compilers and interpreters are types of programming language translators. Get answer to your question and much more Question14Not yet answeredMarked out of 1.00Flag questionQuestion text_______ are high-frequency radio waves that can carry signals over long distances with highaccuracy.Select one: Get answer to your question and much more Question15Not yet answeredMarked out of 1.00Flag questionQuestion textThe _____ available in some countries is too narrow for high-volume transmission ofgraphically and animation-rich webpages. Upload your study docs or become a Course Hero member to access this document Upload your study docs or become a Course Hero member to access this document End of preview. Want to read all 17 pages? Upload your study docs or become a Course Hero member to access this document Tags relation, company s nationality Reduce the risk of systems and organizations ceasing operations Major goals of information security time during which ISs or data are not available in the course of conducting business, has become a dreaded situation for almost every business worldwide total losses of electrical power voltage of the power decreases, or very short interruptions
occur in the flow of power Uninterruptible Power Supply (UPS) systems which provide an alternative power supply for a short time, as soon as a power network fails Keylogging telephoning an employee from a telephone company or the organization's own IT unit, and saying they must have the employee's password to fix a problem When a criminal has a person's identifying details, such as Social Security number, driver's license number, or credit-card number, they can pretend to be this person bogus record in a networked database that neither employees nor buinsess partners would ever access for legitimate purposes server that contains a mirrored copy of a production database (a database that is used for business operations), or one with invalid records so named because they act on programs and data in a fashion similar to the way viruses act on living tissue spreads in a network without human intervention readily available on the market from companies that specialize in developing this kind of software analogous to the destructive gift given
to the ancient Trojans, as described in Greek mythology software that is programmed to cause damage at a specified time to specific applications and data files occurs when a Web site receives an overwhelming number of information requests, such as merely logging on to a site using some or all of the resources of a computer linked to a public network without the consent of its owner constraints and other restrictions imposed on a user or a system, and they can be used to secure systems against the risks just discussed or to reduce damage caused to systems, applications, and data automatic duplication of all data periodically to protect against loss of data Redundant Arrays of Independent Disks measures taken to ensure that only those who are authorized have access to a computer or network, or to certain applications or data unique physical, measurable characteristic of a human being that is used to identify a person set of indivisible transactions; either all transactions are executed or none are--never only some series of documented facts that help detect who recorded which transactions, at what time, and under whose approval Information Systems Auditor Electronic
Data Processing Auditor hardware and software that blocks access to computing resources Demilitarized Zone represents another server for all information requests from resources inside the trusted network process of ensuring that the person who sends a message to or receives a message from you is indeed that person Coding a message into a form unreadable to an interceptor when both the sender and recipient use the same secret key comprising two keys: one is public, and
the other is private Transport Layer Security (TLS) used for transactions on the Web secure version of HTTP way to authenticate online messages, analogous to a physical signature on a piece of paper, but implemented with public-key cryptography akin to the unique fingerprint of a file computer files that serve as the equivalent of ID cards by associating one's identity with one's public key Certificate Authority (CA) organization that serves as a trusted third party that issues digital certificates Single Sign-on Disaster Recovery Plans, Business Resumption Plans, Business Continuity Plans Obtain management's commitment to the plan Establish a planning committee Perform risk assessment and impact analysis Prioritize recovery needs Select a recovery plan Select vendors Develop and implement the plan Test the plan Continually test and evaluate Nine Steps to Develop a Business Recovery Plan Mission-Critical Applications applications without which the business cannot conduct its operations alternative sites provided by companies Is a type of malware that spreads in a network without human intervention?Worms. A computer worm self-replicates and infects other computers without human intervention. This malware inserts itself in devices via security vulnerabilities or malicious links or files. Once inside, worms look for networked devices to attack.
When both the sender and recipient use the same secret key the technique is called ____?Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data.
Which type of user account should be use for every day computing?A standard user account should be used for everyday home tasks, such as editing photos and browsing the web. An administrator account is a user that has complete control of the computer and can make changes that affect other users of the computer, like installing programs and accessing all files on a computer.
Is the process of ensuring that senders and receivers of messages are indeed who they claim to be?Nonrepudiation provides proof of the origin, authenticity and integrity of data. It provides assurance to the sender that its message was delivered, as well as proof of the sender's identity to the recipient. This way, neither party can deny that a message was sent, received and processed.
|