100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MIS 200 exam 2 |99 Questions with Accurate Answers

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
10-04-2025
Written in
2024/2025

MIS 200 exam 2 |99 Questions with Accurate Answers

Institution
MIS 200
Course
MIS 200









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MIS 200
Course
MIS 200

Document information

Uploaded on
April 10, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIS 200 exam 2 |99 Questions with
Accurate Answers
spyware - -software that secretly gathers information about users while they
browse the web

Prevented by installing antivirus software

- adware - -form of spyware. collects information about the user to display
advertisement in the web browser

Prevented by ad-blocking feature

- phishing - -sending fraudulent emails that seem to come from legitimate
sources. direct email recipients to false web sites.

- keystroke loggers - -monitor and record keystrokes. sometimes used by
companies to track employees use of email and internet

- sniffing - -capturing and recording network traffic.

-Used for legitimate reasons like monitoring network performance
-often used by hackers to intercept information

- spoofing - -attempt to gain access to a network by posing as an authorized
user to find sensitive information.

- computer fraud - -unauthorized use of computer data for personal gain..
social network used for committing computer crime.

1. E-mail spamming
2. Virus Hoaxes
3. Changning computer records illegally
4. Denial of service attacks
5. Identity theft
6. Stealing files for industrial espionage

- computer and network security - -critical for most organization. especially
in recent years. Sniffers, password crackers, and rootlets.

- comprehensive security system safegaurds - -protects an organizations
resources. new product designs and such. includes hardware, software,
procedures, and personnel that collectively protect information resources

, - confidentiality - -system must not allow disclosing information to anyone
who isn't authorized to access it.

secure government agencies. business, e commerce.q

- integrity - -ensures the accuracy of information resources within an
organization

- availability - -Authorized users can access the information they need from
operating computers and networks

1. Quick recovery in the event of a system failure or disaster

- three levels of security - -level 1: front end servers
level 2: back end systems
level 3: corporate network

- fault tolerant systems - -Ensure availability in the event of a system failure
by using a combination of hardware and software


Methods used:
1. Uninterruptible power supply (UPS)
2. Redundant array of independent disks (RAID)
3. Mirror disks

- intentional threats - -viruses, worms, trojan programs, logic bombs,
backdoors, blended threats, rootlets, denial of service attacks, social
engineering.

- viruses - -Type of malware.

1.Consists of self-propagating program code that is triggered by a specified
time or event

2.Attaches itself to other files, and the cycle continues when the program or
operating system containing the virus is used

3.Transmitted through a network or e-mail attachments

- worms - -travels from computer to computer in a network. doesn't erase
data.

1. Independent programs that spread themselves without having to be
attached to a host program.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AccurateScores Not yet listed
View profile
Follow You need to be logged in order to follow users or courses
Sold
541
Member since
3 year
Number of followers
336
Documents
15259
Last sold
4 days ago

3.7

113 reviews

5
51
4
18
3
18
2
11
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions