Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a form of malicious software that infects your computer and asks for money?

(Multiple Choice)
4.8/5
(43)

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

(True/False)
4.9/5
(36)

Script-kiddies have criminal intent when hacking.

(True/False)
4.8/5
(41)

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

(Multiple Choice)
4.9/5
(41)

Explain the ethical issues in the use of information technology.

(Essay)
4.8/5
(29)

Describe the relationships and differences between hackers and viruses.

(Essay)
4.9/5
(39)

What is software that is intended to damage or disable computers and computer systems?

(Multiple Choice)
4.8/5
(35)

Trust between companies, customers, partners, and suppliers is the support structure of which of the following?

(Multiple Choice)
4.7/5
(38)

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

(Multiple Choice)
4.8/5
(42)

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

(True/False)
5.0/5
(41)

What is the primary difference between a worm and a virus?

(Multiple Choice)
4.9/5
(38)

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

(True/False)
4.7/5
(36)

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

(True/False)
4.8/5
(39)

Backdoor programs change their form as they propagate.

(True/False)
5.0/5
(30)

What is Simplelocker?

(Multiple Choice)
4.9/5
(35)

Which of the below represents the definition of information compliance?

(Multiple Choice)
4.8/5
(26)

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.9/5
(40)

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

(True/False)
4.9/5
(31)

What is the method or system of government for information management or control?

(Multiple Choice)
4.9/5
(34)

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

(Multiple Choice)
4.8/5
(39)
Showing 81 - 100 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)