1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
6

1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma

ny other systems on his network that had the same problem. Terry was most likely attacked by which of the following types of malware? (1 point)
boot-sector virus
computer worm
spyware
Trojan horse
2. Which of the following components of information systems security deals with the handling of individual workstations? (1 point)
hardware
software
data
procedures
3. ___________ would result in an organization’s computer systems being brought down and becoming unavailable to its users. (1 point)
Communication threats
Denial-of-service attacks
Backdoors
Spyware
4. Which of the following components of information systems does not require a security plan? (1 point)
hardware
people
procedures
all of the components require security plans
5. ________ present the largest risk for data and infrastructure loss. (1 point)
Thefts
Hackers
Human mistakes
Natural disasters
6. There is an infamous e-mail threat in which an individual claims to be a member of Nigerian royalty, and he needs some money to leave the country. In exchange, he will give you lots of money. Which of the following threats most precisely describes this situation? (1 point)
phishing
spoofing
pretexting
sniffing
7. William is working with data, and he neglects to follow the steps outlined by his corporation’s security plan for how to test the data. This could best be described as which type of human threat? (1 point)
data entry error
data scrubbing
procedural error
employee carelessness
8. Which of the following statements best explains the difference between intentional and unintentional threats to information systems? (1 point)
An intentional threat originates from an individual or organization. An unintentional threat does not.
An intentional threat always focuses on software. An unintentional threat always focuses on hardware.
An intentional threat causes irreparable damage. An unintentional threat can always lead to a full recovery.
An intentional threat is any action with a harmful purpose. Unintentional threats do not have a harmful purpose.
9. Which of the following is not an example of software security? (1 point)
data backups
firewalls
malware protection
user authentication
10. Blaire is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an employee must do on his or her computer before leaving for the evening. This situation relates to which of the following components of information systems security? (1 point)
software
data
people
procedures
Computers and Technology
1 answer:
Fantom [35]3 years ago
6 0

Answer:

1. terry: computer worm

2. _ biggest risk: Natural disasters

3. William is working with data: procedural error

4. infamous e-mail: phishing

5. intentional/ unintentional threats: harmful purpose/ not harmful

6._ would result in systems brought down: Denial-of-service attacks

7. which doesn't require a security plan: all of them do

8. Blaire is the director: procedures

9. handling of workstations: hardware

10. which is not an example of software security: data backups

Explanation:

The questions were in a different order for me, so I tried to specify.

You might be interested in
What is the key to satisfaction and success when choosing a career
ELEN [110]

Answer:

be yourself

Explanation:

3 0
3 years ago
Read 2 more answers
The rod and crankshaft convert the up-and-down motion of the piston into
OLEGan [10]
Yes and that is correct
7 0
3 years ago
Read 2 more answers
Who wont me???????????????
Svet_ta [14]

Answer:

whatatattatata

Explanation:

what are u talking about

8 0
3 years ago
Read 2 more answers
his exercise creates a program to convert the temperature values form Fahrenheit to Celsius for a list of 10 temperature values
MissTica

Answer:

def fahrenheit_to_celsius(temperature):

   c = (temperature - 32) / 1.8

   return c    

temperature_list = [-10, -5, 0, 10, 20, 32, 40, 50, 60, 75.2]

i = 0

while i < 10:

   print(str(temperature_list[i]) + " degrees Fahrenheit = " + str(fahrenheit_to_celsius(temperature_list[i])) + " degrees Celsius")

   i += 1

Explanation:

*The code is in Python.

Create a function named fahrenheit_to_celsius that takes one parameter, temperature

Convert the temperature to celsius using the formula

Return the result of the conversion

Create a list holding ten temperatures

Create a while loop that iterates 10 times. Inside the loop, call the function to convert the each temperature in the list and print the result

5 0
3 years ago
Long Answer Questions: a. Briefly explain the types of Control Structures in QBASIC.​
Alexus [3.1K]

Answer:

The three basic types of control structures are sequential, selection and iteration. They can be combined in any way to solve a specified problem. Sequential is the default control structure, statements are executed line by line in the order in which they appear.

7 0
3 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    13·2 answers
  • Which is the correct formula to add the values in cells A1 and B1? A. SUM(A1+B1) B. =SUM(A1+B1) C. =SUMA1+B1 D. A1+B1
    9·2 answers
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • As Juan sat in his biology lab, his instructor was droning on about the techniques of vivisection. Juan kept thinking about the
    5·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _​
    5·1 answer
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
  • If a system contains 1,000 disk drives, each of which has a 750,000- hour MTBF, which of the following best describes how often
    15·1 answer
  • Quick!! I'm TIMED!!!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!