Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

(True/False)
4.8/5
(32)

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

(True/False)
4.7/5
(43)

What is the Child Online Protection Act?

(Multiple Choice)
4.9/5
(36)

What scrambles information into an alternative form that requires a key or password to decrypt?

(Multiple Choice)
5.0/5
(36)

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

(Multiple Choice)
4.9/5
(38)

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processeD.

(True/False)
4.8/5
(41)

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?

(Multiple Choice)
4.8/5
(36)

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

(True/False)
4.8/5
(36)

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reasons on personal networks are two areas that should be addressed by managers in which of the following company policies?

(Multiple Choice)
4.7/5
(37)

What can encryption technology perform?

(Multiple Choice)
4.9/5
(40)

Organizations address security risks through two lines of defense.The first is people and the second is technology.

(True/False)
4.7/5
(37)

Which of the following are all common forms of viruses?

(Multiple Choice)
4.9/5
(32)

Which of the following is the main drawback of biometrics?

(Multiple Choice)
4.9/5
(24)

What is the electronic defacing of an existing website?

(Multiple Choice)
4.8/5
(34)

Which of the choices below represents the definition of information management?

(Multiple Choice)
4.9/5
(37)

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

(True/False)
4.8/5
(33)

What is a threat?

(Multiple Choice)
4.8/5
(34)

Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

(True/False)
4.8/5
(32)

What refers to choosing to allow permissions to incoming emails?

(Multiple Choice)
4.9/5
(41)

Which of the choices below represents the definition of information secrecy?

(Multiple Choice)
4.8/5
(31)
Showing 181 - 200 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)