Exam 11: Information Technology It Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Digital Rights Management (DRM) is __________ technology used by digital copyright owners.

Free
(Short Answer)
4.9/5
(39)
Correct Answer:
Verified

anti-piracy

A Trojan horse installs malicious software on a computer.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

"A property right in an original work of authorship (including literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural work; motion pictures and other audiovisual works; and sound recordings) fixed in any tangible medium of expression, giving the holder exclusive right to reproduce, adapt, distribute, perform and display the work" Is a definition of:

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

Convergence, integration, unification, holistic security are all buzz words for twenty-first century security.

(True/False)
4.7/5
(39)

A patent and a copyright are different names for the same thing.

(True/False)
4.9/5
(34)

Protection provides ___________________ to defend against attacks on assets being secured.

(Short Answer)
4.8/5
(34)

Computer crimes cost __________________________ of dollars annually.

(Short Answer)
5.0/5
(36)

Only the United States government can keep trade secrets through the use of spyware.

(True/False)
4.7/5
(29)

Malicious software or malware is one of the many threats to a computer system.

(True/False)
4.8/5
(28)

Security measures for computer systems include all of the following except

(Multiple Choice)
4.8/5
(30)

___________________________ are usually requested of high-level executives, research-and-development personnel and other employees who have access to sensitive information.

(Short Answer)
4.8/5
(34)

IP video surveillance systems are the most effective way to control a network.

(True/False)
4.8/5
(28)

Detection monitors the amount of time a person takes to respond to the attacks the countermeasures defend against.

(True/False)
4.7/5
(32)

Legal departments can use the ________ in determining the validity of-or defending against-lawsuits and _______________ filed by customers.

(Short Answer)
4.8/5
(35)

The cost of computer crime annually is

(Multiple Choice)
4.8/5
(24)

Security measures for computer systems include all of the following except

(Multiple Choice)
4.8/5
(24)

Common equipment that can pose security threats includes ______, _______ and _________.

(Short Answer)
4.8/5
(38)

The greatest security threats to computer centers include all of the following except

(Multiple Choice)
4.7/5
(38)

Factors to consider in investigating computer crime include all of the following except

(Multiple Choice)
4.9/5
(35)

Telecommunication security information is typically communicated by all of the following except

(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)