MIS-245 FINAL Questions and Correct
Answers/ Latest Update / Already Graded
The communications lines in a client/server environment are
specifically vulnerable to
Ans: Tapping
How do software vendors correct flaws in their software after it has
been distributed?
Ans: They issue patches
The intentional defacement or destruction of a Web site is called
Ans: cyber-vandalism
The HIPAA Act of 1996
Ans: outlines medical security and privacy rules
A Trojan horse
Ans: is software that appears to be benign but does something
other than expected
All rights reserved © 2025/ 2026 |
, Page |2
Which of the following specifications replaces WEP with a stronger
security standard that features changing encryption keys?
Ans: WPA2
________ controls ensure that valuable business data files on either
disk or tape are not subject to unauthorized access, change, or
destruction while they are in use or in storage
Ans: Data security
Computer forensics tasks include all of the following except
Ans: collecting physical evidence on the computer
________ use scanning software to look for known problems such as
bad passwords, the removal of important files, security attacks in
progress, and system administration errors
Ans: Intrusion detection systems
________ refers to policies, procedures, and technical measures used
to prevent unauthorized access, alteration, theft, or physical damage
to information systems.
Ans: "Security"
All rights reserved © 2025/ 2026 |