Question 11 What is defined as the set of protections put in

Question 11

What is defined as the set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized access, use, disclosure, disruption, modification or destruction?

Information Screening

Information Security

Anti-virus

Firewall

2.5 points

Question 12

What kind of threat renders a system inoperative or limits its capability to operate?

Denial of service

Unauthorized access

Theft and fraud

Passive

2.5 points

Question 13

What term is used to refer to someone (or something) pretending to be someone else (or another computer)?

Phishing

Spoofing

Smurfing

Porting

2.5 points

Question 14

You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?

Phishing

Smurfing

Spoofing

Security holes

2.5 points

Question 15

When considering security threats it is very important to consider __________ and __________ of the threat on the organization.

impact, theft

prevalence, impact

repudiation, availablity

theft, prevalence

A.

Information Screening

B.

Information Security

C.

Anti-virus

D.

Firewall

Solution

Question 11: B. Information Security

Question 12: A. Denial of service

Question 13: B. Spoofing

Question 14: A. Phishing

Question 11 What is defined as the set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized acces
Question 11 What is defined as the set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized acces

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site