Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

(True/False)
4.8/5
(30)

Which of the choices below defines information security?

(Multiple Choice)
4.7/5
(33)

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

(Multiple Choice)
4.9/5
(38)

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

(Multiple Choice)
4.9/5
(36)

Which of the following contains general principles to guide computer user behavior?

(Multiple Choice)
4.8/5
(34)

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

(Multiple Choice)
4.7/5
(36)

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

(True/False)
4.9/5
(29)

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?

(Multiple Choice)
4.8/5
(36)

Which of the following is an example of acting ethically?

(Multiple Choice)
4.9/5
(35)

What must you do with antivirus software to make it protect effectively?

(Multiple Choice)
4.9/5
(33)

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

(Multiple Choice)
4.9/5
(35)

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

(True/False)
4.8/5
(37)

What is one of the major problems with email?

(Multiple Choice)
4.9/5
(39)

An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet.

(True/False)
4.7/5
(29)

Which of the choices below represents the definition of information governance?

(Multiple Choice)
4.9/5
(39)

What is information security?

(Multiple Choice)
4.7/5
(44)

Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or branD.

(True/False)
4.9/5
(38)

What is software written with malicious intent to cause annoyance or damage?

(Multiple Choice)
5.0/5
(41)

A social media policy outlines the corporate guidelines or principles governing employee online communications.

(True/False)
4.9/5
(42)

BYOD policies offer four basic options, including 1) unlimited access for personal devices, 2) access only to nonsensitive systems and data, 3) access, but with IT control over personal devices, apps, and stored data, and 4) access, but preventing local storage of data on personal devices.

(True/False)
5.0/5
(32)
Showing 221 - 240 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)