Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is unsolicited email that plagues employees at all levels and clogs email systems?

(Multiple Choice)
4.9/5
(30)

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?

(Multiple Choice)
4.8/5
(38)

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

(Multiple Choice)
4.9/5
(31)

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.9/5
(37)

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

(True/False)
4.8/5
(31)

Which of the following should be included in a company email privacy policy?

(Multiple Choice)
4.8/5
(37)

What is it called when a hacker looks through your trash to find personal information?

(Multiple Choice)
4.8/5
(43)

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

(Multiple Choice)
4.8/5
(42)

Which of the choices below is a common Internet monitoring technology?

(Multiple Choice)
5.0/5
(52)

What requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?

(Multiple Choice)
4.9/5
(33)

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?

(Multiple Choice)
4.9/5
(37)

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

(True/False)
4.9/5
(30)

Backdoor programs change their form as they propagate.

(True/False)
4.7/5
(34)

Which of the following definitions represents website name stealing?

(Multiple Choice)
4.9/5
(38)

What is drive-by hacking?

(Multiple Choice)
5.0/5
(42)

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.

(True/False)
5.0/5
(39)

A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?

(Multiple Choice)
4.7/5
(39)

Which of the following defines opt in?

(Multiple Choice)
4.8/5
(34)

What is a phishing expedition?

(Multiple Choice)
4.9/5
(40)

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

(True/False)
4.9/5
(37)
Showing 261 - 280 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)