Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the below represents the biggest problem of information security breaches?

(Multiple Choice)
4.9/5
(39)

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

(True/False)
4.7/5
(41)

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

(Short Answer)
4.8/5
(34)

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?

(Multiple Choice)
4.9/5
(32)

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

(True/False)
4.8/5
(36)

A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.

(True/False)
4.9/5
(35)

Website name _________ is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

(Short Answer)
4.8/5
(35)

What is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner?

(Multiple Choice)
4.7/5
(36)

There are two means of stealing an identity,____________ reroutes requests for legitimate websites to false websites.

(Short Answer)
4.9/5
(34)

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

(Multiple Choice)
4.9/5
(46)

Which quadrant in the cost of downtime includes equipment rental,overtime costs,and travel expenses?

(Multiple Choice)
4.8/5
(35)

Opt ________ of receiving emails by choosing to deny permission to incoming emails.

(Short Answer)
4.8/5
(43)

Which of the following contains general principles to guide computer user behavior?

(Multiple Choice)
4.8/5
(40)

Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

(True/False)
4.7/5
(45)

All of the following are types of information security breaches except:

(Multiple Choice)
4.9/5
(32)

Which of the following is not an example of unplanned downtime?

(Multiple Choice)
4.8/5
(53)

The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

(Short Answer)
4.9/5
(33)

A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

(True/False)
4.9/5
(34)

Through social ____________,hackers use their social skills to trick people into revealing access credentials or other valuable information.

(Short Answer)
4.8/5
(42)

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

(True/False)
4.9/5
(36)
Showing 281 - 300 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)