Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
To find out your company policy regarding such websites as YouTube,Facebook,and Twitter you would have to refer to the ____________ policy.
(Multiple Choice)
4.8/5
(31)
Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?
(Multiple Choice)
4.8/5
(42)
What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
(Multiple Choice)
4.7/5
(40)
Applications allowed to be placed on the corporate network,like IM software,and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?
(Multiple Choice)
4.8/5
(54)
Tokens are small electronic devices that change user passwords__________.
(Short Answer)
4.8/5
(30)
A(n)_______ is a program or device that can monitor data traveling over a network.
(Short Answer)
4.7/5
(38)
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
(True/False)
4.9/5
(30)
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
(Multiple Choice)
4.8/5
(34)
What refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry?
(Multiple Choice)
4.8/5
(37)
Companies vary in how they expect employees to use computers;however,the overriding principle that needs to be included with these policies should include informed __________.
(Short Answer)
4.9/5
(33)
What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?
(Multiple Choice)
4.7/5
(27)
What uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack?
(Multiple Choice)
4.9/5
(35)
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?
(Multiple Choice)
4.8/5
(36)
What is a group of computers on which a hacker has planted zombie programs?
(Multiple Choice)
4.9/5
(38)
Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
(Essay)
4.9/5
(28)
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
(True/False)
4.8/5
(43)
Which of the following clauses is typically contained in an acceptable use policy?
(Multiple Choice)
4.8/5
(41)
Which of the following protection techniques scans and searches hard drives to prevent,detect,and remove known viruses,adware,and spyware?
(Multiple Choice)
5.0/5
(35)
A digital _____________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.
(Short Answer)
4.7/5
(38)
Showing 221 - 240 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)