1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
6

1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma

ny other systems on his network that had the same problem. Terry was most likely attacked by which of the following types of malware? (1 point)
boot-sector virus
computer worm
spyware
Trojan horse
2. Which of the following components of information systems security deals with the handling of individual workstations? (1 point)
hardware
software
data
procedures
3. ___________ would result in an organization’s computer systems being brought down and becoming unavailable to its users. (1 point)
Communication threats
Denial-of-service attacks
Backdoors
Spyware
4. Which of the following components of information systems does not require a security plan? (1 point)
hardware
people
procedures
all of the components require security plans
5. ________ present the largest risk for data and infrastructure loss. (1 point)
Thefts
Hackers
Human mistakes
Natural disasters
6. There is an infamous e-mail threat in which an individual claims to be a member of Nigerian royalty, and he needs some money to leave the country. In exchange, he will give you lots of money. Which of the following threats most precisely describes this situation? (1 point)
phishing
spoofing
pretexting
sniffing
7. William is working with data, and he neglects to follow the steps outlined by his corporation’s security plan for how to test the data. This could best be described as which type of human threat? (1 point)
data entry error
data scrubbing
procedural error
employee carelessness
8. Which of the following statements best explains the difference between intentional and unintentional threats to information systems? (1 point)
An intentional threat originates from an individual or organization. An unintentional threat does not.
An intentional threat always focuses on software. An unintentional threat always focuses on hardware.
An intentional threat causes irreparable damage. An unintentional threat can always lead to a full recovery.
An intentional threat is any action with a harmful purpose. Unintentional threats do not have a harmful purpose.
9. Which of the following is not an example of software security? (1 point)
data backups
firewalls
malware protection
user authentication
10. Blaire is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an employee must do on his or her computer before leaving for the evening. This situation relates to which of the following components of information systems security? (1 point)
software
data
people
procedures
Computers and Technology
1 answer:
Fantom [35]3 years ago
6 0

Answer:

1. terry: computer worm

2. _ biggest risk: Natural disasters

3. William is working with data: procedural error

4. infamous e-mail: phishing

5. intentional/ unintentional threats: harmful purpose/ not harmful

6._ would result in systems brought down: Denial-of-service attacks

7. which doesn't require a security plan: all of them do

8. Blaire is the director: procedures

9. handling of workstations: hardware

10. which is not an example of software security: data backups

Explanation:

The questions were in a different order for me, so I tried to specify.

You might be interested in
Which scenario depicts an ethical workplace practice by a business owner
viva [34]

The answer is D. It's asking for the most UNETHICAL not ETHICAL, the answer before me was ETHICAL. Sharing personal data is UNETHICAL.

4 0
3 years ago
Read 2 more answers
Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
JulsSmile [24]

Answer:

public class Pyramid {

   public static void main(String[] args) {

             int h = 7;

       System.out.println("Pattern A");

               for(int i = 1; i <= h; ++i)

               {

                   for(int j = 1; j <= i; ++j) {

                       System.out.print("+");

                   }

                   System.out.println();

               }

       System.out.println();

       System.out.println("Pattern B");

               for (int i = 1; i<=h; ++i)

               {

                 for(int j = h; j >=i; --j){

                     System.out.print("+");

                 }

                   System.out.println();

               }

           }

       }

Explanation:

  • The trick in this code is using a nested for loop
  • The outer for loop runs from i = 0 to the heigth of the triangle (in this case 7)
  • The inner for loop which prints the (+) sign runs from j = 0 to j<=i
  • It prints the + using the print() function and not println()
  • In the pattern B the loop is reversed to start from  i = height
8 0
3 years ago
State the difference between a monitor and a television​
Maurinko [17]
The size of a monitor is not much larger. As these are used from a specific distance, it would be so inconvenient if a monitor size is too big.
7 0
2 years ago
Read 2 more answers
Give five example of a dedicated device ​
kogti [31]

Common examples are ATMs, POS terminals, and airport ticket vending machines. Cashierless checkout technologies like “Scan and Go,” inventory scanning, corporate-owned work profile devices, self-ordering kiosks, mobile devices, and POS/m POS are some of the most common examples of dedicated devices in use today.

6 0
2 years ago
Read 2 more answers
1.
natka813 [3]
Its gonna be about 39%.
6 0
3 years ago
Other questions:
  • A. True <br> b. False: variables represent storage locations in the computer's memory.
    13·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • Name the different type of vegetation found in India ?​
    8·2 answers
  • Idea citizen activation
    9·2 answers
  • Do people answer questions more on this site or be on social more ??? no right or wrong answer your opinion
    6·1 answer
  • You are a developer for a news, entertainment, lifestyle, and fashion website. User traffic has steadily increased month-over-mo
    11·1 answer
  • In an executing process, the program counter points __________.
    15·1 answer
  • Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
    12·1 answer
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
  • A social service agency hires accenture to improve training and experiences for caseworkers. What is one way accenture can use v
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!