1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
6

1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma

ny other systems on his network that had the same problem. Terry was most likely attacked by which of the following types of malware? (1 point)
boot-sector virus
computer worm
spyware
Trojan horse
2. Which of the following components of information systems security deals with the handling of individual workstations? (1 point)
hardware
software
data
procedures
3. ___________ would result in an organization’s computer systems being brought down and becoming unavailable to its users. (1 point)
Communication threats
Denial-of-service attacks
Backdoors
Spyware
4. Which of the following components of information systems does not require a security plan? (1 point)
hardware
people
procedures
all of the components require security plans
5. ________ present the largest risk for data and infrastructure loss. (1 point)
Thefts
Hackers
Human mistakes
Natural disasters
6. There is an infamous e-mail threat in which an individual claims to be a member of Nigerian royalty, and he needs some money to leave the country. In exchange, he will give you lots of money. Which of the following threats most precisely describes this situation? (1 point)
phishing
spoofing
pretexting
sniffing
7. William is working with data, and he neglects to follow the steps outlined by his corporation’s security plan for how to test the data. This could best be described as which type of human threat? (1 point)
data entry error
data scrubbing
procedural error
employee carelessness
8. Which of the following statements best explains the difference between intentional and unintentional threats to information systems? (1 point)
An intentional threat originates from an individual or organization. An unintentional threat does not.
An intentional threat always focuses on software. An unintentional threat always focuses on hardware.
An intentional threat causes irreparable damage. An unintentional threat can always lead to a full recovery.
An intentional threat is any action with a harmful purpose. Unintentional threats do not have a harmful purpose.
9. Which of the following is not an example of software security? (1 point)
data backups
firewalls
malware protection
user authentication
10. Blaire is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an employee must do on his or her computer before leaving for the evening. This situation relates to which of the following components of information systems security? (1 point)
software
data
people
procedures
Computers and Technology
1 answer:
Fantom [35]3 years ago
6 0

Answer:

1. terry: computer worm

2. _ biggest risk: Natural disasters

3. William is working with data: procedural error

4. infamous e-mail: phishing

5. intentional/ unintentional threats: harmful purpose/ not harmful

6._ would result in systems brought down: Denial-of-service attacks

7. which doesn't require a security plan: all of them do

8. Blaire is the director: procedures

9. handling of workstations: hardware

10. which is not an example of software security: data backups

Explanation:

The questions were in a different order for me, so I tried to specify.

You might be interested in
When trying to remember a list of words, a person may choose a word to which they "hang" their memories on. This type of mnemoni
nika2105 [10]

Answer:

Peg

Explanation:

This is known as the "peg technique." The name comes from the fact that we usually employ pegs to hang clothes to dry. In this memory aid, the person who wants to memorize something creates mental associations between two concrete objects. This is done in a one-to-one fashion that links all the words together.

6 0
3 years ago
What
AveGali [126]
Answer: Computers and cellular devices
Reason: Everyone every day watched entertainment with commercials of the internet all day on these technologies and proven by 92 percent. Make this brainly answer for everyone else that needs this. Hope this helps:)
8 0
3 years ago
Ryan is working on the layout of her web page. She needs to figure out where her header, navigation bar, text, and images should
julsineya [31]

This answer really depends on your source as it is different for everybody and there really is not one correct answer. Trust me as a web developer I don't always use the same strategy for every site I tackle. Here are some thoughts. See if any sound familiar to you.

Wire framing

Photoshop or graphic mock-up

Sketching

low -fidelity mock-up

Hope that helps.

6 0
3 years ago
Which statements about viruses are true? select the four statements that are true. select the four statements that are true. all
navik [9.2K]
<span>A) All viral genomes contain both DNA and RNA. FALSE. Viruses contain the smallest necessary amount of genetic information packaged in a capsule composed of proteins. Containing both DNA and RNA would be a redundancy that would unnecessarily increase the size of the virus and make it more difficult for the virus to penetrate a cell. B) A retrovirus contains RNA. TRUE. By definition a retrovirus contains single-stranded positive-sense RNA instead of DNA. C) HIV contains two identical strands of DNA. FALSE. HIV is a retrovirus and, therefore, contains RNA instead of DNA. D) HIV contains reverse transcriptase. TRUE. HIV is a retrovirus that contains an RNA genome. All retroviruses require reverse transcriptase to convert their genome from RNA to DNA once the virus has been entered the cell. E) The capsid enters the host cell if the virus is enveloped. TRUE. Viruses are to large to enter a cell by passive diffusion or active transport. The only remaining major form a transport into the cell is endocytosis, or being enveloped. F) All RNA-containing viruses are retroviruses. FALSE. By definition a retrovirus contains single-stranded positive-sense RNA. Viruses can contain RNA in other forms (ie double-stranded) and would, therefore, not be considered a retrovirus. G) Enveloped viruses bud from the host cell. TRUE. Viruses are to large to enter a cell by passive diffusion or active transport. The only remaining major form a transport into the cell is exocytosis. For a virus to exit the host cell and infect other cells, they must exit by exocytosis, or budding.</span>
4 0
3 years ago
Some touch screens recognize when you touch the screen with two fingers or two hands. If you are looking for a device on which y
olga nikolaevna [1]

Answer:

Multi-touch

Explanation:

  • Multi touch is the technology developed by Apple enabling the touch screen to sense multiple fingers.
  • This is called Multi Touch Technology introduced in the year 2007.
  • This is essentially a Multi Point of Contact with the Surface.
  • In the present day, many devices (mobile devices,touch walls and tablets) have this technology (or feature) enabled in their device.
  • So, option (d) Multi-touch is the correct option.
  • There are no touch screen technologies with the name Twin-touch, Dual-touch, Phase-touch.So, options (a),(b),(c) are wrong options.
5 0
3 years ago
Other questions:
  • In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
    14·1 answer
  • Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
    13·2 answers
  • Which of these is an on-site metric for social media marketing?
    13·1 answer
  • Name five services available at banks.
    7·1 answer
  • Write a function max arguments. write a program that reads three floating-point numbers, uses the max function, and displays the
    5·1 answer
  • during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
    7·1 answer
  • Create a Python program in a file named loops1.py that does the following: a. Use a while loop to keep asking the user for input
    14·2 answers
  • Implement function hex2dec that takes a hex number hex_num as a string argument and prints out the corresponding decimal number.
    6·1 answer
  • Need the answer ASAP!!!
    5·1 answer
  • The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors tha
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!