Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is included in the four quadrants of ethical and legal behavior?

(Multiple Choice)
4.8/5
(27)

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

(Multiple Choice)
4.8/5
(37)

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?

(Multiple Choice)
4.8/5
(35)

Which of the following is the correct list of the six different types of hackers listed in your text?

(Multiple Choice)
4.7/5
(33)

What is ediscovery?

(Multiple Choice)
4.9/5
(37)

What is adware?

(Multiple Choice)
4.8/5
(42)

Information compliance is the act of conforming, acquiescing, or yielding information.

(True/False)
4.9/5
(31)

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?

(Multiple Choice)
4.7/5
(31)

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

(True/False)
4.8/5
(42)

Single-factor authentication is the traditional security process, which requires a user name and passworD.

(True/False)
4.9/5
(39)

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.

(True/False)
4.9/5
(36)

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

(Multiple Choice)
4.8/5
(22)

Which of the following defines opt out?

(Multiple Choice)
4.8/5
(42)

A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

(True/False)
4.7/5
(36)

What refers to denying permissions to incoming emails?

(Multiple Choice)
4.8/5
(38)

Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.

(True/False)
4.8/5
(32)

Which of the following would you find in a typical Internet use policy?

(Multiple Choice)
4.9/5
(38)

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(True/False)
4.9/5
(39)

What is vishing?

(Multiple Choice)
4.8/5
(39)

Information security policies detail how an organization will implement the information security plan.

(True/False)
4.9/5
(34)
Showing 41 - 60 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)