Chapter 14 - Student Review

Chapter 14 - Student Review - Business recovery plans can...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
a. To make profit and loss b. To show the government your prpared c. To be ready for the worse d. To prepare for mishaps, either natural or malicious In Information Systems, CA stands for:? a) California b) Certified associate c) Certificate Authority d) Capability Assurance What is a honeypot? a- bogus record in a database that neither employees nor partners would ever access b- server that contains a mirrored copy of a production database c- a set of disks programmed to replicate stored data d- a pot with valuable database information that will keep information for stored incase of disaster. Which of the following are Common controls to protect the system from risks? A. Back up B. Audit Trial C. Access Controls D. All of the Above E. None of the Above What is a honeytoken? A. A protected file created for business or user use B. A bogus record in a network database to catch hackers C. An access flaw for a hacker to enter into the network D. A treat for a bear
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/28/2011 for the course IS 300 taught by Professor Lutters during the Fall '08 term at UMBC.

Page1 / 3

Chapter 14 - Student Review - Business recovery plans can...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online