Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?

(Multiple Choice)
4.8/5
(37)

What is one of the guidelines an organization can follow when creating an information privacy policy?

(Multiple Choice)
4.9/5
(38)

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?

(Multiple Choice)
4.8/5
(36)

Which of the choices below represents the definition of information compliance?

(Multiple Choice)
4.8/5
(36)

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.

(True/False)
4.8/5
(48)

Which of the following is not an example of unplanned downtime?

(Multiple Choice)
5.0/5
(37)

A worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spreaD.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

(True/False)
4.8/5
(41)

Which of the following is one of the four basic options included in a bring your own device policy?

(Multiple Choice)
4.8/5
(38)

Which of the following definitions represents typosquatting?

(Multiple Choice)
4.9/5
(43)

What area of information security focuses on preventing identity theft, phishing, and pharming scams?

(Multiple Choice)
4.8/5
(37)

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?

(Multiple Choice)
4.9/5
(45)

What is click-fraud?

(Multiple Choice)
4.7/5
(35)

What is a group of computers on which a hacker has planted zombie programs?

(Multiple Choice)
4.7/5
(44)

What is the difference between pirated and counterfeit software?

(Multiple Choice)
4.8/5
(40)

Which of the following refers to a period of time when a system is unavailable?

(Multiple Choice)
5.0/5
(49)

Which of the following clauses is typically contained in an acceptable use policy?

(Multiple Choice)
4.8/5
(35)

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

(True/False)
4.9/5
(43)

Which of the following represents the classic example of unintentional information reuse?

(Multiple Choice)
4.9/5
(37)

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

(Multiple Choice)
4.7/5
(40)

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?

(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)