Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following definitions represents Website name stealing?

(Multiple Choice)
5.0/5
(34)

Information _______________ examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.

(Short Answer)
4.8/5
(34)

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?

(Multiple Choice)
4.9/5
(39)

What is drive-by hacking?

(Multiple Choice)
4.9/5
(36)

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort,and he is faced with both physical and information security threats every month.Since the resort implemented a new software system,they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?

(Multiple Choice)
4.7/5
(34)

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?

(Multiple Choice)
4.8/5
(37)

___________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

(Short Answer)
4.9/5
(49)

A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.

(True/False)
4.9/5
(36)

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

(Multiple Choice)
4.8/5
(37)

What is the primary difference between a worm and a virus?

(Multiple Choice)
4.8/5
(34)

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

(True/False)
5.0/5
(35)

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

(True/False)
4.8/5
(35)

Which of the following definitions represents Teergrubing?

(Multiple Choice)
4.8/5
(40)

Which of the following represents the classic example of unintentional information reuse?

(Multiple Choice)
5.0/5
(35)

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

(Multiple Choice)
4.8/5
(35)

Backdoor programs open a way into the network for future attacks.

(True/False)
4.8/5
(32)

Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.

(Short Answer)
4.8/5
(40)

What is phishing?

(Multiple Choice)
4.9/5
(36)

Which of the following represents the three areas where technology can aid in the defense against information security attacks?

(Multiple Choice)
4.9/5
(42)

_______________ software is software that is manufactured to look like the real thing and sold as such.

(Short Answer)
4.8/5
(38)
Showing 241 - 260 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)