Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

(Multiple Choice)
4.8/5
(37)

What is simplelocker?

(Multiple Choice)
4.9/5
(45)

Describe the relationships and differences between hackers and viruses.

(Essay)
4.9/5
(38)

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

(Multiple Choice)
4.9/5
(36)

What is the most secure type of authentication?

(Multiple Choice)
4.9/5
(33)

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

(True/False)
4.9/5
(32)

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?

(Multiple Choice)
4.9/5
(41)

A worm spreads itself not only from file to file but also from computer to computer.

(True/False)
4.7/5
(33)

Which of the following represents the biggest problem of information security breaches?

(Multiple Choice)
4.9/5
(31)

Which of the following represents the three areas where technology can aid in the defense against information security attacks?

(Multiple Choice)
4.9/5
(40)

What is the primary difference between a worm and a virus?

(Multiple Choice)
4.9/5
(41)

Which of the following authentication methods is 100 percent accurate?

(Multiple Choice)
4.8/5
(38)

Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?

(Multiple Choice)
4.8/5
(45)

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

(Multiple Choice)
4.9/5
(40)

What is a masquerading attack that combines spam with spoofing?

(Multiple Choice)
4.8/5
(34)

Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

(True/False)
4.9/5
(37)

An ethical computer use policy contains general principles to guide computer user behavior.

(True/False)
4.8/5
(30)

Which of the following is not considered a form of biometrics?

(Multiple Choice)
4.9/5
(41)

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

(True/False)
4.7/5
(41)

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.8/5
(36)
Showing 61 - 80 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)