Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the method or system of government for information management or control?

(Multiple Choice)
4.8/5
(36)

Intellectual property is _________________ creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

(Short Answer)
4.8/5
(37)

What is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam?

(Multiple Choice)
4.7/5
(41)

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

(True/False)
4.9/5
(39)

Which of the following examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data or information required to function,and grow effectively?

(Multiple Choice)
4.9/5
(33)

Explain the ethical issues in the use of information technology.

(Essay)
4.7/5
(39)

What is the process that provides a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space?

(Multiple Choice)
4.8/5
(39)

The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called __________ computer use policy.

(Short Answer)
4.9/5
(42)

What is spyware?

(Multiple Choice)
4.9/5
(36)

Which of the following refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or an information inquiry?

(Multiple Choice)
4.7/5
(44)

What is a program,when installed on a computer,records every keystroke and mouse click?

(Multiple Choice)
4.7/5
(26)

What is unsolicited email that plagues employees at all levels and clogs email systems?

(Multiple Choice)
5.0/5
(46)

_________ is unsolicited email.

(Short Answer)
4.7/5
(36)

The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.

(True/False)
4.7/5
(40)

The ___________ of downtime is split into four categories: financial performance,revenue,damaged reputations,and other expenses.

(Short Answer)
4.9/5
(34)

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

(Short Answer)
4.8/5
(36)

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

(Short Answer)
4.7/5
(37)

Which of the following definitions represents Typosquatting?

(Multiple Choice)
4.8/5
(39)

Identify theft is the forging of someone's identity for the purpose of __________.

(Short Answer)
4.9/5
(43)

Which of the following policies states that users agree to follow it in order to be given access to corporate email,information systems,and the Internet?

(Multiple Choice)
4.9/5
(41)
Showing 181 - 200 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)