Computers and Technology

1.terry turned on his computer one day to find that all of the storage on his computer was filled up. furthermore, there were many other systems on his network that had the same problem. terry was most likely attacked by which of the following types of malware? (1 point) boot-sector virus computer worm spyware trojan horse2. which of the following components of information systems security deals with the handling of individual workstations? (1 point) hardware software data procedures3. would result in an organization’s computer systems being brought down and becoming unavailable to its users. (1 point) communication threats denial-of-service attacks backdoors spyware4. which of the following components of information systems does not require a security plan? (1 point) hardware people procedures all of the components require security plans5. present the largest risk for data and infrastructure loss. (1 point) thefts hackers human mistakes natural disasters6. there is an infamous e-mail threat in which an individual claims to be a member of nigerian royalty, and he needs some money to leave the country. in exchange, he will give you lots of money. which of the following threats most precisely describes this situation? (1 point) phishing spoofing pretexting sniffing7. william is working with data, and he neglects to follow the steps outlined by his corporation’s security plan for how to test the data. this could best be described as which type of human threat? (1 point) data entry error data scrubbing procedural error employee carelessness8. which of the following statements best explains the difference between intentional and unintentional threats to information systems? (1 point) an intentional threat originates from an individual or organization. an unintentional threat does not. an intentional threat always focuses on software. an unintentional threat always focuses on hardware. an intentional threat causes irreparable damage. an unintentional threat can always lead to a full recovery. an intentional threat is any action with a harmful purpose. unintentional threats do not have a harmful purpose.9. which of the following is not an example of software security? (1 point) data backups firewalls malware protection user authentication10. blaire is the director of information systems at a marketing firm. she creates a set of guidelines that dictate everything an employee must do on his or her computer before leaving for the evening. this situation relates to which of the following components of information systems security? (1 point) software data people procedures

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 17:00, DRock4976
Which of the following is not contained on the slide show toolbar? a. next button b. slide button c. close button d. pen too
Answers: 2
image
Computers and Technology, 23.06.2019 03:10, kyleereeves2007
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e. g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
image
Computers and Technology, 23.06.2019 13:00, dimondqueen511
Which one of the following voltages should never be measured directly with a vom? a. 1200 v b. 500 v c. 800 v d. 100v
Answers: 2
image
Computers and Technology, 23.06.2019 18:30, erjalinalii
Janice recently received her college degree and is looking for a job. she is worried that since she just finished school, she will be required to repay her perkins and direct subsidized loans immediately. janice pulls out the paperwork she signed and reviews it again for repayment information. after reading all of the information, janice discovers that
Answers: 2
Do you know the correct answer?
1.terry turned on his computer one day to find that all of the storage on his computer was filled up...

Questions in other subjects:

Konu
Social Studies, 03.02.2020 14:40
Konu
Geography, 03.02.2020 14:40
Konu
Spanish, 03.02.2020 14:40