High-availability computing:
a. promises continuous availability.
b. promises the elimination of recovery time.
c. uses online transaction and backup systems.
d. helps firms recover quickly from a crash.
Answer: D
Learn More :
ITA 202 Chapter 8
- In this method of encryption, a single encryption key is sent to the receiver so both sender and receiver share the same key.
- A digital certificate system:
- Currently, the protocols used for secure information transfer over the Internet are:
- ______ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
- In this technique, network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver.
- A firewall allows the organization to:
- Biometric authentication:
- A token is a(n):
- Rigorous password systems:
- Smaller firms can outsource security functions to:
- Using methods to make computer systems recover more quickly after mishaps is called:
- Downtime refers to periods of time in which:
- Online transaction processing requires:
- A CSO is a:
- An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n):
- Statements ranking information risks are included in a(n):
- Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
- What is the key issue in information systems security and control?
- Electronic evidence on computer storage media that is not visible to the average user is called:
- The most common type of electronic evidence is:
- ISO 17799:
- The Sarbanes-Oxley Act:
- The Health Insurance Portability and Accountability Act (HIPAA) of 1996:
- Policies, procedures, and tools for managing the retention, destruction, and storage of electronic records is called:
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.