Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is ransomware?

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

A

What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

C

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

False

Which of the following describes confidentiality?

(Multiple Choice)
4.9/5
(32)

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

(True/False)
4.8/5
(26)

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

(Multiple Choice)
4.9/5
(40)

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

(Multiple Choice)
4.9/5
(38)

Which of the following describes privacy?

(Multiple Choice)
4.9/5
(35)

Pirated software is software that is manufactured to look like the real thing and sold as such.

(True/False)
4.8/5
(35)

Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

(True/False)
4.9/5
(34)

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(True/False)
4.8/5
(39)

Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?

(Multiple Choice)
4.8/5
(36)

What is the difference between pirated and counterfeit software?

(Multiple Choice)
4.8/5
(38)

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

(True/False)
4.7/5
(34)

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

(True/False)
4.9/5
(35)

Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

(Multiple Choice)
4.8/5
(33)

Which of the following represents the definition of information governance?

(Multiple Choice)
4.9/5
(24)

What is digital rights management?

(Multiple Choice)
4.9/5
(29)

Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to break into the computer system of one of Cyber Protect's top clients to identify system vulnerabilities and plug the holes. What type of hacker is Matt?

(Multiple Choice)
4.8/5
(36)

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)