Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

(Multiple Choice)
4.8/5
(36)

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

(Multiple Choice)
4.8/5
(33)

Information governance is a method or system of government for information management or control.

(True/False)
4.8/5
(37)

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?

(Multiple Choice)
4.9/5
(35)

Script kiddies have criminal intent when hacking.

(True/False)
4.7/5
(29)

What is dumpster diving?

(Multiple Choice)
4.8/5
(32)

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

(Multiple Choice)
4.8/5
(38)

What is multifactor authentication?

(Multiple Choice)
4.9/5
(32)

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

(Multiple Choice)
4.8/5
(47)

What is a mail bomb?

(Multiple Choice)
4.8/5
(43)

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?

(Multiple Choice)
4.8/5
(40)

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

(True/False)
4.9/5
(38)

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

(Multiple Choice)
4.8/5
(37)

What is spyware?

(Multiple Choice)
4.8/5
(31)

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

(True/False)
4.8/5
(31)

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

(True/False)
4.9/5
(32)

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?

(Multiple Choice)
5.0/5
(33)

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

(True/False)
5.0/5
(39)

What is a hacker?

(Multiple Choice)
4.8/5
(37)

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

(True/False)
4.9/5
(35)
Showing 81 - 100 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)