Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the below represents the definition of information management?

(Multiple Choice)
4.9/5
(40)

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

(Multiple Choice)
4.8/5
(34)

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

(Multiple Choice)
4.8/5
(35)

What is adware?

(Multiple Choice)
4.8/5
(35)

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

(Multiple Choice)
4.8/5
(36)

Information compliance is the act of conforming, acquiescing, or yielding information.

(True/False)
4.9/5
(34)

Which of the following changes its form as it propagates?

(Multiple Choice)
4.9/5
(42)

What is spyware?

(Multiple Choice)
4.8/5
(33)

Information governance is a method or system of government for information management or control.

(True/False)
4.9/5
(39)

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(True/False)
4.7/5
(39)

Backdoor programs open a way into the network for future attacks.

(True/False)
4.9/5
(31)

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

(Multiple Choice)
4.7/5
(31)

Which of the following is not an example of unplanned system downtime?

(Multiple Choice)
4.7/5
(28)

What is pirated software?

(Multiple Choice)
4.8/5
(42)

What is a bug bounty program?

(Multiple Choice)
4.8/5
(34)

A worm spreads itself not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

(True/False)
4.9/5
(40)

Which of the following represents the two fundamental building blocks that protect organizational information?

(Multiple Choice)
4.9/5
(38)

Which of the following is the correct list of the six different types of hackers listed in your text?

(Multiple Choice)
4.7/5
(36)

Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

(True/False)
4.9/5
(36)

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?

(Multiple Choice)
4.7/5
(33)
Showing 61 - 80 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)