1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
6

1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma

ny other systems on his network that had the same problem. Terry was most likely attacked by which of the following types of malware? (1 point)
boot-sector virus
computer worm
spyware
Trojan horse
2. Which of the following components of information systems security deals with the handling of individual workstations? (1 point)
hardware
software
data
procedures
3. ___________ would result in an organization’s computer systems being brought down and becoming unavailable to its users. (1 point)
Communication threats
Denial-of-service attacks
Backdoors
Spyware
4. Which of the following components of information systems does not require a security plan? (1 point)
hardware
people
procedures
all of the components require security plans
5. ________ present the largest risk for data and infrastructure loss. (1 point)
Thefts
Hackers
Human mistakes
Natural disasters
6. There is an infamous e-mail threat in which an individual claims to be a member of Nigerian royalty, and he needs some money to leave the country. In exchange, he will give you lots of money. Which of the following threats most precisely describes this situation? (1 point)
phishing
spoofing
pretexting
sniffing
7. William is working with data, and he neglects to follow the steps outlined by his corporation’s security plan for how to test the data. This could best be described as which type of human threat? (1 point)
data entry error
data scrubbing
procedural error
employee carelessness
8. Which of the following statements best explains the difference between intentional and unintentional threats to information systems? (1 point)
An intentional threat originates from an individual or organization. An unintentional threat does not.
An intentional threat always focuses on software. An unintentional threat always focuses on hardware.
An intentional threat causes irreparable damage. An unintentional threat can always lead to a full recovery.
An intentional threat is any action with a harmful purpose. Unintentional threats do not have a harmful purpose.
9. Which of the following is not an example of software security? (1 point)
data backups
firewalls
malware protection
user authentication
10. Blaire is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an employee must do on his or her computer before leaving for the evening. This situation relates to which of the following components of information systems security? (1 point)
software
data
people
procedures
Computers and Technology
1 answer:
Fantom [35]3 years ago
6 0

Answer:

1. terry: computer worm

2. _ biggest risk: Natural disasters

3. William is working with data: procedural error

4. infamous e-mail: phishing

5. intentional/ unintentional threats: harmful purpose/ not harmful

6._ would result in systems brought down: Denial-of-service attacks

7. which doesn't require a security plan: all of them do

8. Blaire is the director: procedures

9. handling of workstations: hardware

10. which is not an example of software security: data backups

Explanation:

The questions were in a different order for me, so I tried to specify.

You might be interested in
A person's oral communication skills can give either a positive or negative first impression.
ratelena [41]

Answer:

true

Explanation:

oral communication can be awkward or good.

5 0
3 years ago
Which of the following is true about a hot site?
swat32

Answer:

Option(d) is the correct answer to the given question.

Explanation:

A hot site is a place off site in which the task of a corporation could restart during a massive failure.The hot site seems to have all the needed equipment for such the corporation to schedule the normal activities, such as phone jacks, replacement data, laptops, and linked devices.

  • The main objective of hot sites provide an useful backup mechanism for any corporation that wishes to pursue its business in the presence of exceptional circumstances or events.
  • All the others options are not related to hot site that's why they are incorrect option.
8 0
3 years ago
Which diagram is NOT a good model of 3÷14?
swat32
I need a pic for this
7 0
3 years ago
Read 2 more answers
Hey! I was recommended a site “9anime” the other day. All’s been going well but I accidentally taped on a new dub settingZ somet
Studentka2010 [4]

Answer:

yep defiantly virus

Explanation:

8 0
2 years ago
Read 2 more answers
Someone who is young, lacks funds, and really wants to gain technical skills while serving his or her nation should consider
Scilla [17]
Hello there!

They already gave you the answer just by saying "while serving his or her nation". So, the only way you can serve your nation is when you join the military.

So, the correct missing word is Joining the military.


I hope this helps!
6 0
4 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • The tone a writer takes is referred to as the writing _____.
    7·2 answers
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • what notation system supports presenting the largest numbers using fewest digits; Binary, decimal or hexadecimal?
    11·1 answer
  • Pleaseeee help me w this!
    10·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • Which statement is true?
    13·2 answers
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!