Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
(True/False)
4.8/5
(41)
Which of the following is a cost of downtime in addition to lost revenue?
(Multiple Choice)
5.0/5
(35)
A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
(True/False)
4.8/5
(33)
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
(True/False)
4.8/5
(38)
Which of the following is a cost of downtime in addition to lost revenue?
(Multiple Choice)
4.9/5
(38)
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
(Multiple Choice)
4.8/5
(44)
To decrypt information is to decode it and is the opposite of encrypt.
(True/False)
4.8/5
(40)
What type of encryption technology uses multiple keys, one for public and one for private?
(Multiple Choice)
4.9/5
(42)
What are computer viruses that wait for a specific date before executing their instructions?
(Multiple Choice)
4.9/5
(45)
What reroutes requests for legitimate websites to false websites?
(Multiple Choice)
4.8/5
(28)
What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?
(Multiple Choice)
4.8/5
(38)
Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
(True/False)
4.9/5
(38)
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
(Multiple Choice)
4.9/5
(36)
What reroutes requests for legitimate websites to false websites?
(Multiple Choice)
4.7/5
(29)
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
(Multiple Choice)
4.8/5
(31)
Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
(True/False)
4.8/5
(37)
The best and most effective way to manage authentication is through ________.
(Multiple Choice)
4.7/5
(43)
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
(True/False)
4.8/5
(44)
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
(True/False)
4.8/5
(32)
Showing 301 - 320 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)