Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____________ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

Typosquatting

What can encryption technology perform?

Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
Verified

D

Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.

Free
(Short Answer)
4.7/5
(42)
Correct Answer:
Verified

Program

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(True/False)
4.7/5
(38)

What is a method for confirming users' identities?

(Multiple Choice)
4.8/5
(44)

What is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

(Multiple Choice)
4.9/5
(38)

What are experts in technology who use their knowledge to break into computers and networks,for profit or just as a challenge known as?

(Multiple Choice)
5.0/5
(38)

A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.

(True/False)
4.7/5
(36)

Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.

(True/False)
4.8/5
(38)

Using ones social skills to trick people into revealing access credentials or other valuable information is called ______________.

(Multiple Choice)
4.9/5
(31)

The protection of customers' privacy is one of the largest ethical issues for corporations today._____________ is the right to be left alone when you want to be,to have control over your personal possessions.

(Short Answer)
4.8/5
(50)

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(True/False)
4.9/5
(42)

What is a hacker?

(Multiple Choice)
4.8/5
(38)

Which act strengthened criminal laws against identity theft?

(Multiple Choice)
4.8/5
(37)

What is the Child Online Protection Act?

(Multiple Choice)
4.8/5
(31)

What are critical questions that managers should ask when determining the cost of downtime?

(Multiple Choice)
4.9/5
(45)

Digital _______ management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

(Short Answer)
4.9/5
(30)

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(True/False)
4.9/5
(40)

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

(Multiple Choice)
4.8/5
(36)

Cyberbullying is an act or object that poses a danger to assets.

(True/False)
4.8/5
(41)
Showing 1 - 20 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)