Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following definitions represents Internet censorship?

(Multiple Choice)
4.8/5
(32)

The most secure procedures combine which of the following authentication and authorization techniques?

(Multiple Choice)
4.9/5
(36)

Cyberbullying is an act or object that poses a danger to assets.

(True/False)
4.9/5
(40)

Which of the following is considered a type of biometrics?

(Multiple Choice)
4.9/5
(37)

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

(Essay)
5.0/5
(41)

What is adware?

(Multiple Choice)
4.8/5
(35)

What is cybervandalism?

(Multiple Choice)
4.8/5
(34)

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

(True/False)
4.8/5
(33)

What is pharming?

(Multiple Choice)
4.7/5
(44)

Which of the following changes its form as it propagates?

(Multiple Choice)
4.8/5
(36)

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

(True/False)
4.8/5
(30)

What are the first two lines of defense a company should take when addressing security risks?

(Multiple Choice)
4.9/5
(31)

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

(Multiple Choice)
4.8/5
(34)

Different organizations and countries have their own terms for fair information practices.Which of the following is correct?

(Multiple Choice)
4.9/5
(31)

What is the difference between phishing and pharming?

(Multiple Choice)
4.7/5
(34)

What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)?

(Multiple Choice)
4.8/5
(36)

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

(True/False)
4.8/5
(38)

Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

(True/False)
4.8/5
(40)

Which of the following represents the two fundamental building blocks that protect organizational information?

(Multiple Choice)
4.9/5
(34)

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

(True/False)
4.8/5
(39)
Showing 161 - 180 of 331
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)