Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is ransomware?

(Multiple Choice)
4.9/5
(35)

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

(True/False)
4.9/5
(41)

What is a program, when installed on a computer, records every keystroke and mouse click?

(Multiple Choice)
4.8/5
(34)

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employees' activities by measures such as keystrokes, error rate, and number of transactions processed?

(Multiple Choice)
5.0/5
(46)

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

(True/False)
4.9/5
(38)

What is the method or system of government for information management or control?

(Multiple Choice)
4.8/5
(48)

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?

(Multiple Choice)
4.7/5
(31)

Where do organizations typically place firewalls?

(Multiple Choice)
4.8/5
(36)

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

(Multiple Choice)
4.9/5
(30)

What are biometrics?

(Multiple Choice)
4.8/5
(34)

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

(Multiple Choice)
4.9/5
(36)

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formulA.Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.

(True/False)
4.9/5
(31)

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

(True/False)
4.8/5
(36)

Which of the following describes workplace MIS monitoring?

(Multiple Choice)
4.7/5
(37)

Worms are computer viruses that wait for a specific date before executing their instructions.

(True/False)
4.9/5
(31)

What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack?

(Multiple Choice)
4.8/5
(45)

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

(Multiple Choice)
4.9/5
(36)

Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

(True/False)
4.9/5
(40)

Charles Mott works for a company called VeriSign that acts as a trusted third party to verify information.One of Charles's largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online, and a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?

(Multiple Choice)
4.8/5
(39)

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

(Multiple Choice)
4.8/5
(30)
Showing 241 - 260 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)