100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

MIS 200 Exam 2 Questions with Correct Answers 100% Verified By Experts

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
15-01-2026
Written in
2025/2026

MIS 200 Exam 2 Questions with Correct Answers 100% Verified By Experts

Institution
MIS 200
Course
MIS 200









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MIS 200
Course
MIS 200

Document information

Uploaded on
January 15, 2026
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIS 200 Exam 2 Questions with Correct Answers 100% Verified By Experts| Latest Update
Guaranteed Success

spyware software that secretly gathers information about users while they browse the web


Prevented by installing antivirus software



adware form of spyware. collects information about the user to display advertisement in the
web browser


Prevented by ad-blocking feature



phishing sending fraudulent emails that seem to come from legitimate sources. direct email
recipients to false web sites.



keystroke loggers monitor and record keystrokes. sometimes used by companies to track
employees use of email and internet



sniffing capturing and recording network traffic.


-Used for legitimate reasons like monitoring network performance
-often used by hackers to intercept information



spoofing attempt to gain access to a network by posing as an authorized user to find
sensitive information.



computer fraud unauthorized use of computer data for personal gain.. social network used
for committing computer crime.


1. E-mail spamming

, 2. Virus Hoaxes
3. Changning computer records illegally
4. Denial of service attacks
5. Identity theft
6. Stealing files for industrial espionage



computer and network security critical for most organization. especially in recent years.
Sniffers, password crackers, and rootlets.



comprehensive security system safegaurds protects an organizations resources. new
product designs and such. includes hardware, software, procedures, and personnel that
collectively protect information resources



confidentiality system must not allow disclosing information to anyone who isn't authorized
to access it.


secure government agencies. business, e commerce.q



integrity ensures the accuracy of information resources within an organization



availability Authorized users can access the information they need from operating
computers and networks


1. Quick recovery in the event of a system failure or disaster



three levels of security level 1: front end servers
level 2: back end systems
level 3: corporate network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MindRift Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
5 months
Number of followers
0
Documents
7615
Last sold
2 weeks ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions