100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MIS 320 NDSU FINAL EXAM QUESTIONS AND ANSWERS NEW UPDATE

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
27-08-2024
Written in
2024/2025

MIS 320 NDSU FINAL EXAM QUESTIONS AND ANSWERS NEW UPDATE To minimize the invasion of privacy, _____. - Answer-users should be able to review their records and correct any inaccuracies An intrusion detection system can protect networks against both external and internal access. T/F - Answer-true Social engineering is an attack that takes advantage of the backdoors in security systems. T/F - Answer-false __is a form of spyware that records the keys pressed on a keyboard and can be software or hardware devices. - Answer-Keystroke loggers ____is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. - Answer-spoofing Which of the following statements is true of a worm? - Answer-It is an independent program that can spread itself without attaching itself to a host program. In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment. - Answer-disaster recovery plan ___ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority. - Answer-Asymmetric key encryption __ is a biometric security measure - Answer-fingerprint The lock in a browser address bar indicates a safe web connection over _____. - Answer-Secure Sockets Layer In _____, one node is in charge of selecting the path for all packets. - Answer-centralized routing ____ is the amount of data that can be transferred from one point to another in one second. - Answer-bandwidth

Show more Read less
Institution
MIS 320 NDSU
Course
MIS 320 NDSU









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MIS 320 NDSU
Course
MIS 320 NDSU

Document information

Uploaded on
August 27, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIS 320 NDSU FINAL EXAM QUESTIONS
AND ANSWERS NEW UPDATE
To minimize the invasion of privacy, _____. - Answer-users should be able to review
their records and correct any inaccuracies

An intrusion detection system can protect networks against both external and internal
access. T/F - Answer-true

Social engineering is an attack that takes advantage of the backdoors in security
systems. T/F - Answer-false

__is a form of spyware that records the keys pressed on a keyboard and can be
software or hardware devices. - Answer-Keystroke loggers

____is an attempt to gain access to a network by posing as an authorized user in order
to find sensitive information, such as passwords and credit card information. - Answer-
spoofing

Which of the following statements is true of a worm? - Answer-It is an independent
program that can spread itself without attaching itself to a host program.

In the event of a network attack or intrusion, a _____ lists the tasks that must be
performed by the organization to restore damaged data and equipment. - Answer-
disaster recovery plan

___ is a type of data encryption that enables users of the Internet to securely and
privately exchange data through the use of a pair of keys that is obtained from a trusted
authority and shared through that authority. - Answer-Asymmetric key encryption

__ is a biometric security measure - Answer-fingerprint

The lock in a browser address bar indicates a safe web connection over _____. -
Answer-Secure Sockets Layer

In _____, one node is in charge of selecting the path for all packets. - Answer-
centralized routing

____ is the amount of data that can be transferred from one point to another in one
second. - Answer-bandwidth

, Identify a true statement about the different forms of sender and receiver devices. -
Answer-Thin clients have no processing power.

____ refers to the electronic transfer of data from one location to another. - Answer-
Data communication

Communication media that use an antenna for transmitting data through air or water are
called _____. - Answer-radiated media

__ refers to rules of conduct that govern data communication. - Answer-protocol

Typically, a narrowband carries more data than a broadband. T/F - Answer-false

Computer indicators such as 0s and 1s used for instructions are signals.
T/F - Answer-true

In data communication, _____ refers to integrating voice, video, and other data to
create multimedia information that can be used for decision making. - Answer-
convergence

___ check to see what links are on the user's Web page and make sure they work; if a
link is broken, they identify it and include this information as part of the data about that
page. - Answer-crawlers

A(n) _____is a secure network that uses the internet and web technologies to connect
intranets of business partners so that communication between organizations is possible.
- Answer-Extranet

Which of the following is a type of interorganizational system? - Answer-extranet

The protocol that is used for internet telephony is _____. - Answer-Voice over internet
protocol

_are indexes of information, based on keywords embedded in documents, that allow
search engines to find what Internet users are looking for. - Answer-Directories

There are multiple internet backbones, and they are connected at network access
points. T/F - Answer-true

Which of the following indicates the top-level domain for the universal resource locator
(URL), http://www.csub.edu? - Answer-.edu

An intranet application or service that uses an organization's computer network. T/F -
Answer-true

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
778
Member since
3 year
Number of followers
475
Documents
15064
Last sold
2 days ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

163 reviews

5
87
4
21
3
25
2
6
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions