1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
6

1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma

ny other systems on his network that had the same problem. Terry was most likely attacked by which of the following types of malware? (1 point)
boot-sector virus
computer worm
spyware
Trojan horse
2. Which of the following components of information systems security deals with the handling of individual workstations? (1 point)
hardware
software
data
procedures
3. ___________ would result in an organization’s computer systems being brought down and becoming unavailable to its users. (1 point)
Communication threats
Denial-of-service attacks
Backdoors
Spyware
4. Which of the following components of information systems does not require a security plan? (1 point)
hardware
people
procedures
all of the components require security plans
5. ________ present the largest risk for data and infrastructure loss. (1 point)
Thefts
Hackers
Human mistakes
Natural disasters
6. There is an infamous e-mail threat in which an individual claims to be a member of Nigerian royalty, and he needs some money to leave the country. In exchange, he will give you lots of money. Which of the following threats most precisely describes this situation? (1 point)
phishing
spoofing
pretexting
sniffing
7. William is working with data, and he neglects to follow the steps outlined by his corporation’s security plan for how to test the data. This could best be described as which type of human threat? (1 point)
data entry error
data scrubbing
procedural error
employee carelessness
8. Which of the following statements best explains the difference between intentional and unintentional threats to information systems? (1 point)
An intentional threat originates from an individual or organization. An unintentional threat does not.
An intentional threat always focuses on software. An unintentional threat always focuses on hardware.
An intentional threat causes irreparable damage. An unintentional threat can always lead to a full recovery.
An intentional threat is any action with a harmful purpose. Unintentional threats do not have a harmful purpose.
9. Which of the following is not an example of software security? (1 point)
data backups
firewalls
malware protection
user authentication
10. Blaire is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an employee must do on his or her computer before leaving for the evening. This situation relates to which of the following components of information systems security? (1 point)
software
data
people
procedures
Computers and Technology
1 answer:
Fantom [35]3 years ago
6 0

Answer:

1. terry: computer worm

2. _ biggest risk: Natural disasters

3. William is working with data: procedural error

4. infamous e-mail: phishing

5. intentional/ unintentional threats: harmful purpose/ not harmful

6._ would result in systems brought down: Denial-of-service attacks

7. which doesn't require a security plan: all of them do

8. Blaire is the director: procedures

9. handling of workstations: hardware

10. which is not an example of software security: data backups

Explanation:

The questions were in a different order for me, so I tried to specify.

You might be interested in
The instant pivot button is displayed in the statistics and visualization tabs when a _______ search is run.
Arisa [49]

Answer:

<h2>The instant pivot button is displayed in the statistics and visualization tabs when a <u>non-transforming</u>  search is run. </h2>

Explanation:

<h3>Transforming Search:</h3>

It can be defined as a search in which transforming commands are used that involve, charts and stats to convert data of events that is gained by the search in to tables (statistical). These tables can further be used for the basis of visualizing data in the form of charts.

Non-Transforming Search:

The search that do no contains produce event lists that can be viewed in Events tab. while using non-transforming search, i we want to generate tables or charts we must follow the points below:

  • Click ob statistics and Visualization tab.
  • Select pivot to open the search.
  • All the visualizations can be generated in this editor.

<h2>i hope it will help you!</h2>
5 0
3 years ago
For whover needed pont
podryga [215]

Answer:

Thank you have a nice day:)

8 0
3 years ago
Read 2 more answers
assume that name is a variable of type stirng that has been assigned a value write an expression whose value is the last charact
Snezhnost [94]

Answer:

The most straight forward way to do it: in general string are zero index based array of characters, so you need to get the length of the string, subtract one and that will be the last character, some expressions in concrete languages would be:

In Python:

name = "blair"

name[len(name) - 1]

In JavaScript:

name = "blair"

name[name.length - 1]

In C++:

#include <string>

string name = "blair";

name[name.length() - 1];

7 0
3 years ago
Why is the OSI reference model useful?
sveticcg [70]
The answer to this question is B.

3 0
3 years ago
Do you think LinkedIn offers an effective way for businesses to market their services? Why or why not?
larisa86 [58]
Yes, because it allows many users to get together and work to help project their services.
5 0
3 years ago
Read 2 more answers
Other questions:
  • __________ is when a person feels compelled to acquire and abuse a drug despite the harm it causes him or her personally, and de
    7·2 answers
  • In the beginning of a presentation, it is important to:
    9·1 answer
  • You and a few friends are having a meal at a pizza restaurant, and the server has just given you the bill. Write a function that
    14·1 answer
  • Introduction to Identity and Fitting In
    7·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • 4.2 lesson practice help plzs
    6·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • Which letter shows the ball when it has the maximum kinetic energy
    15·1 answer
  • Whats 12/29 divided by 12/34
    7·2 answers
  • 3. Which part of the computer is used<br> for typing?<br> a. Mouse<br> b. Keyboard
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!