Exam 15: HRIS Privacy and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe cyberterrorism and how to at least control its impact.

Free
(Essay)
4.8/5
(34)
Correct Answer:
Verified

•Cyberterrorism - leveraging of an information system,particularly via the Internet,is intended to cause physical,real-world harm or severe disruption of system infrastructure (Hinde,2003).A spy has high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information.

Which is NOT a symptom of spyware on an employee's computer?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

______ are best described as people who accesses a computer or computer network unlawfully.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

A

A hacker is defined as someone who accesses a computer or computer network unlawfully.

(True/False)
4.7/5
(36)

Which type of security threat is the most widespread,affecting almost 90% of companies?

(Multiple Choice)
4.9/5
(33)

According to the text,approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

(Multiple Choice)
4.9/5
(47)

Which state has passed a law protecting employee records in private organizations?

(Multiple Choice)
4.9/5
(35)

Three main goals of information security are to achieve confidentiality, integrity, and availability within an HRIS.

(True/False)
4.9/5
(34)

All companies have been affected by computer-based fraud,such as data processing or data entry routines that are modified.

(True/False)
4.8/5
(41)

There are many threats to information security.Please describe five information security threats.

(Essay)
4.8/5
(46)

Which of the following is considered a common security threat?

(Multiple Choice)
4.8/5
(40)

Viruses and trojans are common external security threats to organizations and often come in e-mail attachments.

(True/False)
4.8/5
(44)

Which of the following is NOT a recommended privacy policy statement?

(Multiple Choice)
4.9/5
(28)

What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least five best practices that were discussed in class,as well as in your textbook.

(Essay)
4.7/5
(35)

Describe the McCumber Cube approach to privacy.

(Essay)
4.8/5
(36)

Briefly list and describe the important goals and considerations of information security.

(Essay)
4.9/5
(40)

The McCumber Cube for Data Privacy has three dimensions.Which of the following is NOT a dimension that is used to organize a privacy policy?

(Multiple Choice)
4.9/5
(44)

Which of the following is NOT considered a threat to security?

(Multiple Choice)
4.7/5
(32)

What is the difference between a computer virus and spyware?

(Essay)
4.8/5
(42)

Which of the following is NOT considered a software threat to security?

(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 28
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)