MIS 200 Exam 2 Questions with Correct Answers 100% Verified By Experts| Latest Update
Guaranteed Success
spyware software that secretly gathers information about users while they browse the web
Prevented by installing antivirus software
adware form of spyware. collects information about the user to display advertisement in the
web browser
Prevented by ad-blocking feature
phishing sending fraudulent emails that seem to come from legitimate sources. direct email
recipients to false web sites.
keystroke loggers monitor and record keystrokes. sometimes used by companies to track
employees use of email and internet
sniffing capturing and recording network traffic.
-Used for legitimate reasons like monitoring network performance
-often used by hackers to intercept information
spoofing attempt to gain access to a network by posing as an authorized user to find
sensitive information.
computer fraud unauthorized use of computer data for personal gain.. social network used
for committing computer crime.
1. E-mail spamming
, 2. Virus Hoaxes
3. Changning computer records illegally
4. Denial of service attacks
5. Identity theft
6. Stealing files for industrial espionage
computer and network security critical for most organization. especially in recent years.
Sniffers, password crackers, and rootlets.
comprehensive security system safegaurds protects an organizations resources. new
product designs and such. includes hardware, software, procedures, and personnel that
collectively protect information resources
confidentiality system must not allow disclosing information to anyone who isn't authorized
to access it.
secure government agencies. business, e commerce.q
integrity ensures the accuracy of information resources within an organization
availability Authorized users can access the information they need from operating
computers and networks
1. Quick recovery in the event of a system failure or disaster
three levels of security level 1: front end servers
level 2: back end systems
level 3: corporate network
Guaranteed Success
spyware software that secretly gathers information about users while they browse the web
Prevented by installing antivirus software
adware form of spyware. collects information about the user to display advertisement in the
web browser
Prevented by ad-blocking feature
phishing sending fraudulent emails that seem to come from legitimate sources. direct email
recipients to false web sites.
keystroke loggers monitor and record keystrokes. sometimes used by companies to track
employees use of email and internet
sniffing capturing and recording network traffic.
-Used for legitimate reasons like monitoring network performance
-often used by hackers to intercept information
spoofing attempt to gain access to a network by posing as an authorized user to find
sensitive information.
computer fraud unauthorized use of computer data for personal gain.. social network used
for committing computer crime.
1. E-mail spamming
, 2. Virus Hoaxes
3. Changning computer records illegally
4. Denial of service attacks
5. Identity theft
6. Stealing files for industrial espionage
computer and network security critical for most organization. especially in recent years.
Sniffers, password crackers, and rootlets.
comprehensive security system safegaurds protects an organizations resources. new
product designs and such. includes hardware, software, procedures, and personnel that
collectively protect information resources
confidentiality system must not allow disclosing information to anyone who isn't authorized
to access it.
secure government agencies. business, e commerce.q
integrity ensures the accuracy of information resources within an organization
availability Authorized users can access the information they need from operating
computers and networks
1. Quick recovery in the event of a system failure or disaster
three levels of security level 1: front end servers
level 2: back end systems
level 3: corporate network