Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

(True/False)
4.8/5
(41)

Which of the following is a cost of downtime in addition to lost revenue?

(Multiple Choice)
5.0/5
(35)

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

(True/False)
4.8/5
(33)

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

(True/False)
4.8/5
(38)

Which of the following is a cost of downtime in addition to lost revenue?

(Multiple Choice)
4.9/5
(38)

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

(Multiple Choice)
4.8/5
(44)

To decrypt information is to decode it and is the opposite of encrypt.

(True/False)
4.8/5
(40)

What type of encryption technology uses multiple keys, one for public and one for private?

(Multiple Choice)
4.9/5
(42)

What are computer viruses that wait for a specific date before executing their instructions?

(Multiple Choice)
4.9/5
(45)

What reroutes requests for legitimate websites to false websites?

(Multiple Choice)
4.8/5
(28)

What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?

(Multiple Choice)
4.8/5
(38)

What is information secrecy?

(Multiple Choice)
4.9/5
(36)

Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

(True/False)
4.9/5
(38)

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

(Multiple Choice)
4.9/5
(36)

What reroutes requests for legitimate websites to false websites?

(Multiple Choice)
4.7/5
(29)

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

(Multiple Choice)
4.8/5
(31)

Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

(True/False)
4.8/5
(37)

The best and most effective way to manage authentication is through ________.

(Multiple Choice)
4.7/5
(43)

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(True/False)
4.8/5
(44)

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

(True/False)
4.8/5
(32)
Showing 301 - 320 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)