Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To find out your company policy regarding such websites as YouTube,Facebook,and Twitter you would have to refer to the ____________ policy.

(Multiple Choice)
4.8/5
(31)

Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?

(Multiple Choice)
4.8/5
(42)

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?

(Multiple Choice)
4.7/5
(40)

Applications allowed to be placed on the corporate network,like IM software,and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?

(Multiple Choice)
4.8/5
(54)

Tokens are small electronic devices that change user passwords__________.

(Short Answer)
4.8/5
(30)

A(n)_______ is a program or device that can monitor data traveling over a network.

(Short Answer)
4.7/5
(38)

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

(True/False)
4.9/5
(30)

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

(Multiple Choice)
4.8/5
(34)

What refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry?

(Multiple Choice)
4.8/5
(37)

Companies vary in how they expect employees to use computers;however,the overriding principle that needs to be included with these policies should include informed __________.

(Short Answer)
4.9/5
(33)

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?

(Multiple Choice)
4.7/5
(27)

What uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack?

(Multiple Choice)
4.9/5
(35)

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

(Multiple Choice)
4.8/5
(36)

What is a group of computers on which a hacker has planted zombie programs?

(Multiple Choice)
4.9/5
(38)

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

(Essay)
4.9/5
(28)

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

(True/False)
4.8/5
(43)

What is the difference between phishing and pharming?

(Multiple Choice)
4.9/5
(39)

Which of the following clauses is typically contained in an acceptable use policy?

(Multiple Choice)
4.8/5
(41)

Which of the following protection techniques scans and searches hard drives to prevent,detect,and remove known viruses,adware,and spyware?

(Multiple Choice)
5.0/5
(35)

A digital _____________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.

(Short Answer)
4.7/5
(38)
Showing 221 - 240 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)