Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following definitions represents physical security?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

Using one's social skills to trick people into revealing access credentials or other valuable information is called ________.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

A

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

True

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

(Multiple Choice)
4.9/5
(34)

Which of the following describes privacy?

(Multiple Choice)
4.7/5
(38)

Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

(True/False)
4.8/5
(36)

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.

(Multiple Choice)
4.9/5
(28)

Tokens are small electronic devices that change user passwords automatically.

(True/False)
4.7/5
(29)

What is digital rights management?

(Multiple Choice)
4.8/5
(40)

Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?

(Multiple Choice)
5.0/5
(32)

Trust between companies, customers, partners, and suppliers are the support structure of which of the following?

(Multiple Choice)
4.8/5
(45)

Explain the ethical issues in the use of information technology.

(Essay)
4.9/5
(42)

A user can opt in to receive emails by choosing to allow permissions to incoming emails.

(True/False)
4.8/5
(37)

What is two-factor authentication?

(Multiple Choice)
4.8/5
(44)

What is a destructive agent?

(Multiple Choice)
4.9/5
(37)

What is single-factor authentication?

(Multiple Choice)
4.8/5
(38)

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?

(Multiple Choice)
4.9/5
(47)

Spyware is software that, while purporting to serve some useful function and often fulfills that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

(True/False)
4.9/5
(44)

Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.

(True/False)
4.9/5
(42)

A worm is a form of malicious software that infects your computer and asks for money.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)