Page 5 TR-Exam 2, Version C The protection of information from accidental or intentional misuse by...
Page 5 TR-Exam 2, Version C The protection of information from accidental or intentional misuse by persons inside or outside an organization 27. A. Information Downtime B. Information Security C. Information Ethics D. Information Governance 28. The ethical component of an Information System: A. AI B. Expert System C. Govemance D. Individuals 29, Methods for confirming users' identities. A. Something the user has B. Something the user knows. C. Something that is part of the user. D. All of these. 30. What makes big data "big?" A. Volume, Velocity, Variety B. It is unstructured C. It is structured D. SQL In the network shown, the machines on the right connect to the machine on the left in order to 31. get access to webpages, files music, and/or other services. It is what kind of network? A. LAN B. Peer-to-Peer C. Client/Server D. Ring What item sells best at Walmarts in Florida when a hurricane is on the way? 32. A. Strawberry Pop-Tarts B. Beer C. Batteries D. Generators