Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the choices below represents the definition of information property?

(Multiple Choice)
4.8/5
(36)

What is pirated software?

(Multiple Choice)
4.7/5
(42)

What is it called when government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

(Multiple Choice)
4.8/5
(44)

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

(Multiple Choice)
4.7/5
(34)

Which of the following choices is not one of the six epolicies that a company should implement for information protection as discussed in the text?

(Multiple Choice)
4.8/5
(33)

What is spyware?

(Multiple Choice)
4.8/5
(42)

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(True/False)
4.9/5
(42)

What is one of the most common forms of computer vulnerabilities that can cause massive computer damage?

(Multiple Choice)
4.8/5
(32)

What prevention technique scrambles information into an alternative form that requires a key or password to decode?

(Multiple Choice)
4.8/5
(30)

What is pretexting?

(Multiple Choice)
4.7/5
(25)

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

(True/False)
4.9/5
(34)

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

(Multiple Choice)
4.8/5
(43)

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

(Multiple Choice)
4.7/5
(40)

Pirated software is software that is manufactured to look like the real thing and sold as such.

(True/False)
4.8/5
(34)

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?

(Multiple Choice)
4.9/5
(34)

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?

(Multiple Choice)
4.8/5
(34)

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

(True/False)
4.7/5
(32)

Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

(True/False)
4.9/5
(32)

What is an act or object that poses a danger to assets?

(Multiple Choice)
4.7/5
(29)

What is competitive click-fraud?

(Multiple Choice)
4.9/5
(41)
Showing 101 - 120 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)