Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is forging of someone's identity for the purpose of fraud?

(Multiple Choice)
4.8/5
(41)

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?

(Multiple Choice)
5.0/5
(29)

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

(Multiple Choice)
4.8/5
(34)

Which of the following defines teergrubing?

(Multiple Choice)
4.8/5
(40)

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

(Multiple Choice)
4.9/5
(35)

To find out your company's policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.

(Multiple Choice)
4.9/5
(33)

What decodes information?

(Multiple Choice)
4.8/5
(40)

Which of the following key terms represents the principles and standards that guide our behavior toward other people?

(Multiple Choice)
4.9/5
(38)

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customers' names.This is a classic example of which of the following security breaches?

(Multiple Choice)
4.8/5
(44)

Identify the six epolicies organizations should implement to protect themselves.

(Essay)
4.8/5
(40)

A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.

(True/False)
4.8/5
(42)

What is an anti-spamming approach whereby the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?

(Multiple Choice)
4.7/5
(33)

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

(True/False)
4.9/5
(35)

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

(Multiple Choice)
4.8/5
(34)

What is a method for confirming users' identities?

(Multiple Choice)
4.9/5
(32)

A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or branD.

(True/False)
4.9/5
(36)

Who are hackers with criminal intent?

(Multiple Choice)
4.9/5
(35)

Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

(True/False)
4.8/5
(37)

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

(Multiple Choice)
4.9/5
(30)

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

(Multiple Choice)
5.0/5
(35)
Showing 141 - 160 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)