Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Exam 1: Management Information Systems: Business Driven MIS342 Questions
Exam 2: Decisions and Processes: Value Driven Business330 Questions
Exam 3: Ebusiness: Electronic Business Value357 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS331 Questions
Exam 5: Infrastructures: Sustainable Technologies298 Questions
Exam 6: Data: Business Intelligence401 Questions
Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS303 Questions
Exam 8: Enterprise Applications: Business Communications328 Questions
Exam 9: Systems Development and Project Management: Corporateresponsibility311 Questions
Exam 10: Hardware and Software Basics148 Questions
Exam 11: Networks and Telecommunications75 Questions
Exam 12: Designing Data-Bases-Apply Your Knowledge-Glossary27 Questions
Select questions type
Which of the choices below represents the definition of information property?
(Multiple Choice)
4.8/5
(36)
What is it called when government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
(Multiple Choice)
4.8/5
(44)
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
(Multiple Choice)
4.7/5
(34)
Which of the following choices is not one of the six epolicies that a company should implement for information protection as discussed in the text?
(Multiple Choice)
4.8/5
(33)
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
(True/False)
4.9/5
(42)
What is one of the most common forms of computer vulnerabilities that can cause massive computer damage?
(Multiple Choice)
4.8/5
(32)
What prevention technique scrambles information into an alternative form that requires a key or password to decode?
(Multiple Choice)
4.8/5
(30)
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
(True/False)
4.9/5
(34)
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
(Multiple Choice)
4.8/5
(43)
What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
(Multiple Choice)
4.7/5
(40)
Pirated software is software that is manufactured to look like the real thing and sold as such.
(True/False)
4.8/5
(34)
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?
(Multiple Choice)
4.9/5
(34)
What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?
(Multiple Choice)
4.8/5
(34)
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
(True/False)
4.7/5
(32)
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
(True/False)
4.9/5
(32)
Showing 101 - 120 of 331
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)