Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
Which of the following definitions represents physical security?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
Using one's social skills to trick people into revealing access credentials or other valuable information is called ________.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
A
The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
(Multiple Choice)
4.9/5
(34)
Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
(True/False)
4.8/5
(36)
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.
(Multiple Choice)
4.9/5
(28)
Tokens are small electronic devices that change user passwords automatically.
(True/False)
4.7/5
(29)
Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?
(Multiple Choice)
5.0/5
(32)
Trust between companies, customers, partners, and suppliers are the support structure of which of the following?
(Multiple Choice)
4.8/5
(45)
A user can opt in to receive emails by choosing to allow permissions to incoming emails.
(True/False)
4.8/5
(37)
Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?
(Multiple Choice)
4.9/5
(47)
Spyware is software that, while purporting to serve some useful function and often fulfills that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
(True/False)
4.9/5
(44)
Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.
(True/False)
4.9/5
(42)
A worm is a form of malicious software that infects your computer and asks for money.
(True/False)
4.8/5
(33)
Showing 1 - 20 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)