Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?

(Multiple Choice)
4.9/5
(41)

Which of the below would not be found in a typical acceptable use policy?

(Multiple Choice)
4.8/5
(35)

Organizations address security risks through two lines of defense;the first is __________,and the second is technology.

(Short Answer)
4.9/5
(33)

Which of the following occurs when organizations use software that filters content,such as email,to prevent the accidental or malicious transmission of unauthorized information?

(Multiple Choice)
4.8/5
(46)

Decrypt information is to decode it and is the opposite of encrypt.

(True/False)
4.9/5
(34)

What is information secrecy?

(Multiple Choice)
4.7/5
(35)

Which of the following describes workplace MIS monitoring?

(Multiple Choice)
4.7/5
(33)

What is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens?

(Multiple Choice)
5.0/5
(40)

What is the electronic defacing of an existing website?

(Multiple Choice)
4.9/5
(41)

___________is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

(Short Answer)
4.7/5
(40)

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?

(Multiple Choice)
4.8/5
(38)

Which of the following is the main drawback of biometrics?

(Multiple Choice)
4.8/5
(36)

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

(True/False)
4.8/5
(26)

What is click-fraud?

(Multiple Choice)
4.8/5
(38)

Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

(True/False)
4.9/5
(41)

An ethical computer use policy contains general principles to guide computer user behavior.

(True/False)
4.8/5
(26)

An email ____________ policy details the extent to which email messages may be read by others.

(Short Answer)
4.9/5
(32)

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.

(Multiple Choice)
4.9/5
(25)

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?

(Multiple Choice)
4.7/5
(40)

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

(Short Answer)
5.0/5
(37)
Showing 261 - 280 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)