Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software and can act as ________.

(Multiple Choice)
4.9/5
(32)

Multifactor authentication is the traditional security process, which requires a user name and passworD.

(True/False)
4.8/5
(44)

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?

(Multiple Choice)
4.9/5
(41)

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

(True/False)
4.8/5
(35)

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?

(Multiple Choice)
5.0/5
(34)

Which of the choices below represents the definition of information compliance?

(Multiple Choice)
4.7/5
(39)

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

(Multiple Choice)
4.8/5
(44)

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

(True/False)
4.8/5
(33)

What outlines the corporate guidelines or principles governing employee online communications?

(Multiple Choice)
4.9/5
(42)

What includes a variety of threats such as viruses, worms, and Trojan horses?

(Multiple Choice)
4.9/5
(39)

A zombie farm is a group of computers on which a hacker has planted zombie programs.

(True/False)
4.8/5
(36)

What is phishing?

(Multiple Choice)
4.9/5
(41)

Which of the following is not considered an epolicy?

(Multiple Choice)
4.8/5
(27)

A user can opt out of receiving emails by choosing to deny permission to incoming emails.

(True/False)
4.8/5
(36)

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

(True/False)
4.9/5
(40)

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

(Multiple Choice)
4.8/5
(28)

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(True/False)
4.7/5
(34)

Backdoor programs open a way into the network for future attacks.

(True/False)
4.8/5
(31)

Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

(True/False)
4.8/5
(32)

Ransomware is a form of malicious software that infects your computer and asks for money.

(True/False)
4.8/5
(37)
Showing 201 - 220 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)