Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is spear phishing?

(Multiple Choice)
4.7/5
(35)

Which policy contains general principles regarding information privacy?

(Multiple Choice)
4.7/5
(37)

Identity theft is the forging of someone's identity for the purpose of frauD.

(True/False)
4.9/5
(43)

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

(Multiple Choice)
4.8/5
(38)

Phishing reroutes requests for legitimate websites to false websites.

(True/False)
4.9/5
(32)

What is an insider?

(Multiple Choice)
4.8/5
(40)

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

(Multiple Choice)
4.9/5
(29)

Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

(True/False)
4.7/5
(40)

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

(True/False)
4.8/5
(28)

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

(Multiple Choice)
5.0/5
(43)

eBay is an example of an online company that has been faced with numerous security issues.For example, imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course, this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?

(Multiple Choice)
4.9/5
(46)

A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.

(True/False)
4.7/5
(35)

What is a form of malicious software that infects your computer and asks for money?

(Multiple Choice)
4.9/5
(33)

Describe the relationship between information security policies and an information security plan.

(Essay)
4.9/5
(34)

Users would agree to all of the following in a typical acceptable use policy except ________.

(Multiple Choice)
4.7/5
(34)

Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.

(Multiple Choice)
4.8/5
(45)

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month.Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?

(Multiple Choice)
4.9/5
(34)

Cybervandalism is the electronic defacing of an existing website.

(True/False)
4.8/5
(41)

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?

(Multiple Choice)
4.9/5
(41)

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

(True/False)
4.7/5
(40)
Showing 281 - 300 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)