Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
Which of the following definitions represents Website name stealing?
(Multiple Choice)
5.0/5
(34)
Information _______________ examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.
(Short Answer)
4.8/5
(34)
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?
(Multiple Choice)
4.9/5
(39)
Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort,and he is faced with both physical and information security threats every month.Since the resort implemented a new software system,they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?
(Multiple Choice)
4.7/5
(34)
Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
(Multiple Choice)
4.8/5
(37)
___________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
(Short Answer)
4.9/5
(49)
A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.
(True/False)
4.9/5
(36)
What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?
(Multiple Choice)
4.8/5
(37)
What is the primary difference between a worm and a virus?
(Multiple Choice)
4.8/5
(34)
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
(True/False)
5.0/5
(35)
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
(True/False)
4.8/5
(35)
Which of the following definitions represents Teergrubing?
(Multiple Choice)
4.8/5
(40)
Which of the following represents the classic example of unintentional information reuse?
(Multiple Choice)
5.0/5
(35)
What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?
(Multiple Choice)
4.8/5
(35)
Backdoor programs open a way into the network for future attacks.
(True/False)
4.8/5
(32)
Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
(Short Answer)
4.8/5
(40)
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
(Multiple Choice)
4.9/5
(42)
_______________ software is software that is manufactured to look like the real thing and sold as such.
(Short Answer)
4.8/5
(38)
Showing 241 - 260 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)